Vous êtes sur la page 1sur 480

Microsoft-70-410-Sacriestory

Number: 70-410
Passing Score: 800
Time Limit: 120 min
File Version: 1.0

Exam A
QUESTION 1
Your network contain an active directory domain named Contoso.com. The domain contains two servers
named server1 and server2 that run Windows Server 2012 R2. You create a security template named
template1 by using the security template snap-in.
You need to apply template1 to server2.
Which tool should you use?
A.
B.
C.
D.

Security Templates
Computer Management
Security Configuration and Analysis
System Configuration

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Template was already created - Provide standard security option to use in security policies B. Needs to be
applied at the GP level
C. Security templates are inactive until imported into a Group Policy object or the SecurityConfiguration and
Analysis
D. Tool to ID windows problems
Get Latest & Actual 70-410 Exam's Question and Answers from Passleader.

http://technet.microsoft.com/en-us/library/jj730960.aspx http://windows.microsoft.com/en-us/windows-vista/
using-system-configuration
QUESTION 2
Your network contains an active directory domain named Contoso.com. The domain contains a server named
Server1 that runs Windows Server 2012 R2. You create a group Managed Service Account named gservice1.
You need to configure a service named service1 to run as the gservice1 account.
How should you configure service1?
A.
B.
C.
D.

From Services Console configure the recovery settings


From a command prompt ,run sc.exe and specify the config parameter
From Windows PowerShell,run Set-Service and specify the -PassThrough parameter
From a command prompt ,run sc.exe and specify the sdset parameter

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Sc config, Modifies the value of a service's entries in the registry and in the Service Control Manager
database.

obj= {<AccountName> | <ObjectName>}


Specifies a name of an account in which a service will run, or specifies a name of the Windows driver object in
which the driver will run. The default setting is LocalSystem.
password= <Password>
Specifies a password. This is required if an account other than the LocalSystem account is used.
Get Latest & Actual 70-410 Exam's Question and Answers from Passleader.

QUESTION 3
Your network contains an active directory domain named Contoso.com. The domain contains 100 user
accounts that reside in an organizational unit (OU) named OU1. You need to ensure that user named user1
can link and unlink Group Policy Objects(GPOs) to OU1. The solution must minimize the number of
permissions assigned to user1.
What should you do?
A.
B.
C.
D.

Run the Delegation of Control Wizard on the Policies containers


Run the Set-GPPermission cmdlet
Run the Delegation of Control Wizard on OU1
Modify the permission on the user1 account

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Not minimum permissions
B. Grants a level of permissions to a security principal for one GPO or all the GPOs in a domain C. Minimizes
delegated permission to a single OU
D. Will not allow GPO changes to the OU
Delegation of Control Wizard
The following are common tasks that you can select to delegate control of them:
Create, delete, and manage user accounts
Reset user passwords and force password change at next logon Read all user information Modify the
membership of a group
Join a computer to a domain
Manage Group Policy links
Generate Resultant Set of Policy (Planning)
Generate Resultant Set of Policy (Logging)
Create, delete, and manage inetOrgPerson accounts
Reset inetOrgPerson passwords and force password change at next logon Read all inetOrgPerson information

QUESTION 4
You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has 2 dual-core processors and 16 GB of RAM.
You install the Hyper-V server role in Server1.
You plan to create two virtual machines on Server1.
You need to ensure that both virtual machines can use up to 8 GB of memory. The solution must ensure that
both virtual machines can be started simultaneously.
What should you configure on each virtual machine?
A.
B.
C.
D.

Dynamic Memory
NUMA topology
Memory weight
Ressource Control

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Dynamic Memory adjusts the amount of memory available to a virtual machine, based on changes in
memory demand and values that you specify
B. Used for high performance apps like SQL
C. Provides Hyper-V with a way to determine how to distribute memory among virtual machines if there is not
enough physical memory available in the computer to give every virtual machine its requested amount of
memory.
D. Resource controls provide you with several ways to control the way that Hyper-V allocates resources to
virtual machine.

http://technet.microsoft.com/en-us/library/ff817651(v=ws.10).aspx http://technet.microsoft.com/en-us/library/
hh831410.aspx http://technet.microsoft.com/en-us/library/cc742470.aspx
QUESTION 5
You have a server named Server1 that runs Windows Server 2012 R2.
You promote Server1 to domain controller.
You need to view the service location (SVR) records that Server1 registers on DNS.
What should you do on Server1?
A.
B.
C.
D.

Open the Srv.sys file


Open the Netlogon.dns file
Run ipconfig/displaydns
Run Get-DnsServerDiagnostics

Correct Answer: B

Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Timestamp server driver
B. Netlogon service creates a log file that contains all the locator resource records stored in netlogon.
C. used to display current resolver cache content
D. Gets DNS event logging details

http://technet.microsoft.com/en-us/library/cc959303.aspx http://technet.microsoft.com/en-us/library/jj649883
(v=wps.620).aspx
QUESTION 6
Your network contains an active directory domain named Contoso.com. The domain contains a server named
Server1 that runs Windows Server 2012 R2 and has the Hyper-V server role installed.
You have a virtual machine named VM1. VM1 has a snapshot.
You need to modify the Snapshot File Location of VM1.
What should you do First?
A.
B.
C.
D.

Copy the snapshot file


Pause VM1
Shut down VM1
Delete the snapshot

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
How are snapshots stored?

Snapshot data files are stored as .avhd files. Taking multiple snapshots can quickly consume storage space.
In the first release version of Hyper-V (KB950050) and in Hyper-V in Windows Server 2008 Service Pack 2,
snapshot, snapshot data files usually are located in the same folder as the virtual machine by default. In
Hyper-V in Windows Server 2008 R2, the files usually are located in the same folder as the virtual hard disk.
The following exceptions affect the location of the snapshot data files: If the virtual machine was imported with
snapshots, they are stored in their own folder. If the virtual machine has no snapshots and you configure the
virtual machine snapshot setting, all snapshots you takeafterwards will be stored in the folder you specify.
Caution
Do not delete .avhd files directly from the storage location. Instead, use Hyper-V Manager to select the virtual
machine, and then delete the snapshots from the snapshot tree. Do not expand a virtual hard disk when it is
used in a virtual machine that has snapshots. Doing so will make the snapshots unusable.
http://technet.microsoft.com/en-us/library/dd560637(v=ws.10).aspx
QUESTION 7
You have a network printer connected to print server.
You need to be able to print if print server goes down.
What should you chose?
A.
B.
C.
D.

brach office direct printing


printer pooling
spooling
Print forwarding

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Branch Office Direct Printing can reduce Wide Area Network (WAN) usage by printing directly to a print device
instead of a server print queue. This feature can be enabled or disabled on a per printer basis and is
transparent to the user. It is enabled by an administrator using the Print Management Console or Windows
PowerShell on the server.
The printer information is cached in the branch office, so that if the print server is unavailable for some reason
(for example if the WAN link to the data center is down), then it is still possible for the user to print.
Branch Office Direct Printing requires the following operating systems:
- Windows Server 2012
- Windows 8
http://technet.microsoft.com/en-us/library/jj134156.aspx
QUESTION 8
You have external virtual switch with srv-io enabled with 10 Virtual Machines on it. You need to make the
Virtual Machines able to talk only to each other.
A.
B.
C.
D.

remove the vswitch and recreate it as private.


add new vswitch
remove vswitch and recreate it as public
adjust srv-io settings

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
There are three possible modes for the Hyper-V switch: private, internal, and public. Do not confuse these with
IP addressing schemes or any other networking configuration in a different technology.

Private Switch
The private switch allows communications among the virtual machines on the host and nothing else. Even the
management operating system is not allowed to participate. This switch is purely logical and does not use any
physical adapter in any way. "Private" in this sense is not related to private IP addressing. You can mentally
think of this as a switch that has no ability to uplink to other switches.
Internal Switch
The internal switch is similar to the private switch with one exception: the management operating system can
have a virtual adapter on this type of switch and communicate with any virtual machines that also have virtual
adapters on the switch. This switch also does not have any matching to a physical adapter and therefore also
cannot uplink to another switch.
External Switch
This switch type must be connected to a physical adapter. It allows communications between the physical
network and the management operating system and virtual machines. Do not confuse this switch type with
public IP addressing schemes or let its name suggest that it needs to be connected to a public-facing
connection.
You can use the same private IP address range for the adapters on an external virtual switch that you're using
on the physical network it's attached to
http://www.altaro.com/hyper-v/the-hyper-v-virtual-switch-explained-part-1/#ixzz2W095PeZd http://
technet.microsoft.com/en-us/library/hh831823.aspx http://www.altaro.com/hyper-v/hyper-v-virtual-switchexplained-part-2/
QUESTION 9
Your network contains an Active Directory domain named contoso.com.
The domain contains two domain controllers.
The domain controllers are configured as shown in the following table.

You install a new server named Server 1 that runs a Server Core Instillation of Windows Server 2012 R2.
You need to join Server 1 to the contoso.com domain.
The solution must minimize administrative effort.
What should you use?
A.
B.
C.
D.

The dsadd.exe command


The New-ADComputer cmdlet
The Djoin.exe command
The Add-Computer cmdlet

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Adds specific types of objects to the directory
B. Creates a new Active Directory computer.
C. Use djoin for offline join in the perimeter network .
D. Add the local computer to a domain or workgroup.
http://technet.microsoft.com/en-us/library/ee617245.aspx http://technet.microsoft.com/en-us/library/ff793312
(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc753708(v=ws.10).aspx http://

technet.microsoft.com/en-us/library/hh849798.aspx
QUESTION 10
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1 that runs Windows Server 2012 R2. Server1 contains a single virtual machine named VM1.
You need to ensure that a user named User1 can manage the virtual machine settings of VM1. The solution
must minimize the number of permissions assigned to User1.
To which group should you add User1?
A.
B.
C.
D.

Server Operators
Administrators
Power Users
Hyper-V Administrators

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
This group can reduce the number of users that belong to the local Administrators group while providing users
with access to Hyper-VSimplified authorization:
The Hyper-V Administrators group is introduced and is implemented as a local security group.
What value does this change add?
This group can reduce the number of users that belong to the local Administrators group while providingusers
with access to Hyper-V.
What works differently?
The Hyper-V Administrators group is a new local security group. Add users to this group instead of thelocal
Administrators group to provide them with access to Hyper-V. Members of the Hyper-V Administrators have
complete and unrestricted access to all features of Hyper-V. http://technet.microsoft.com/en-us/library/
hh831410.aspx
QUESTION 11
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Windows Server 2012 R2. You create a group Managed Service Account named gservice1. You need to
configure a service named Service1 to run as the gservice1 account.
How should you configure Service1?
A.
B.
C.
D.

From the Services console, configure the General settings.


From Windows PowerShell, run Set-Service and specify the -StartupType parameter.
From a command prompt, run sc.exe and specify the config parameter.
From a command prompt, run sc.exe and specify the privs parameter.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. General settings only allow you to stop, start and set type/paramaters B. Set-Service provides a way for you
to change the Description, StartupType, or DisplayName of a service
C. Modifies service configuration
D. Sets the response/action on service failure
http://windows.microsoft.com/en-us/windows-vista/using-system-configuration http://technet.microsoft.com/enus/library/ee176963.aspx http://technet.microsoft.com/en-us/library/cc990290(v=ws.10).aspx http://
technet.microsoft.com/en-us/library/cc738230(v=ws.10).aspx

QUESTION 12
Your network contains an Active Directory domain named contoso.com. The domain contains a domain
controller named DC1 that runs Windows Server 2012 R2. A user named User1 attempts to log on to DO, but
receives the error message shown in the exhibit. (Click the Exhibit button.)

You need to ensure that User1 can log on to DC1.


What should you do?
A.
B.
C.
D.

Modify the Account is sensitive and cannot be delegated setting of the User1 account.
Grant User1 the Allow log on locally user right.
Modify the Logon Workstations setting of the User1 account.
Add User1 to the Remote Management Users group.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Domain controllers, by default, restrict the types of user accounts that have the ability to log on locally.

Domain controllers, by default, restrict the types of user accounts that have the ability to log on locally.
By default, only members of the Account Operators, Administrators, Backup Operators, Print Operators,
andServer Operators groups have the Allowed logon locally system right. If you want to grant a user account
theability to log on locally to a domain controller, you must either make that user a member of a group that
alreadyhas the Allowed logon locally system right or grant the right to that user account.
Edit Default Domain Controllers Policy Expand Computer Configuration, Policies, Windows Settings, Security
Settings, Local Policies, click UserRights Assignment.
Double-click Allow Logon Locally.
http://technet.microsoft.com/en-us/library/ee957044(v=ws.10).aspx
QUESTION 13
Your network contains a single Active Directory domain named contoso.com. The network contains two
subnets. The subnets are configured as shown in the following table.

The network contains a member server named Server1 that runs Windows Server 2012 R2. Server1 has the
DHCP Server server role installed. Server1 is configured to lease IP addresses to the two subnets. You
discover that computers on the Warehouse subnet that have static IP addresses can communicate with the
computers on the MainOffice subnet. Computers on the Warehouse subnet that obtain an IP address
automatically can only communicate with other computers on the Warehouse subnet.
You need to ensure that all of the computers on the Warehouse subnet can communicate with the computers
on the MainOffice subnet.
Which DHCP option should you configure on Server1?
A.
B.
C.
D.

003 Router
011 Resource Location Servers
020 Nonlocal Source Routing
019 IP Layer Forwarding

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. This option is normally used to assign a default gateway to DHCP clients on a subnet. A DHCP
clientrequests this option.
B. This option specifies a list of IP addresses for resource location servers C. This option specifies whether the
DHCP client enables or disables the forwarding at the IP layer ofdatagrams that contain source routing
information and were sent by a non-local host. D. This option specifies whether the DHCP client should enable
or disable forwarding of datagrams at the IPlayer.

http://technet.microsoft.com/en-us/library/dd145324(v=ws.10).aspx http://technet.microsoft.com/en-us/library/
ee941211(v=ws.10).aspx
QUESTION 14
Your network contains an Active Directory domain named contoso.com. The network contains 500 client
computers that run Windows 8. All of the client computers connect to the Internet by using a web proxy.
You deploy a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server
role installed.
You configure all of the client computers to use Server1 as their primary DNS server. You need to prevent
Server1 from attempting to resolve Internet host names for the client computers.
What should you do on Server1?
A.
B.
C.
D.
E.
F.
G.
H.

Configure the Security settings of the contoso.com zone.


Remove all root hints.
Create a primary zone named ".".
Create a primary zone named "root".
Create a primary zone named "GlobalNames".
Create a forwarder that points to 169.254.0.1.
Create a stub zone named "root".
Create a zone delegation for GlobalNames.contoso.com.

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Explanation:
B. necessary to remove the default root hints files
C. Create a primary zone named "." ( dot zone, root )
When you install DNS on a Windows server that does not have a connection to the Internet, the zone for the
domain is created and a root zone, also known as a dot zone, is also created. This root zone may prevent
access to the Internet for DNS and for clients of the DNS. If there is a root zone, there are no other zones other
than those that are listed with DNS, and you cannot configure forwarders or root hint servers.
Root domain This is the top of the tree, representing an unnamed level; it is sometimes shown as two empty
quotation marks (""), indicating a null value. When used in a DNS domain name, it is stated by a trailing period
(.) to designate that the name is located at the root or highest level of the domain hierarchy. In this instance,
the DNS domain name is considered to be complete and points to an exact location in the tree of names.
Names stated this way are called fully qualified domain names (FQDNs).

http://technet.microsoft.com/en-us/library/cc772774%28v=ws.10%29.aspx http://youtu.be/KjMDtlR6Mhk http://


support.microsoft.com/kb/298148/en-us
QUESTION 15
Your company has a remote office that contains 600 client computers on a single subnet. You need to select a
subnet mask for the network that will support all of the client computers. The solution must minimize the
number of unused addresses.
Which subnet mask should you select?
A.
B.
C.
D.

255.255.252.0
255.255.254.0
255.255.255.0
255.255.255.128

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Using a subnet mask of 255.255.252.0 will result in the fewest number of unused IP addresses.
QUESTION 16
Your network contains three servers that run Windows Server 2012 R2. The servers are configured as shown
in the following table.

Server3 is configured to obtain an IP address automatically. You need to prevent Server3 from receiving an IP
address from Server1.
What should you create on Server1?
A.
B.
C.
D.

A reservation
A filter
A scope option
An exclusion

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. For clients that require a constant IP address
B. Filter to exclude MAC address of Server3
C. Range of allowed IP's to be assigned
D. Exclude range of IP's
MAC address based filtering ensure that only a known set of devices in the system are able to obtain an
IPAddress from the DHCP

Reservation and Exclusion, two incredibly different concepts. An exclusion is an address or range of
addresses taken from a DHCP scope that the DHCP server is notallowed to hand out. For example, if you
have set a DHCP server to exclude the address range 192.168.0.1-192.168.0.10 then the only way a computer
on your network would get an address of 192.168.0.4 would be ifyou assigned it statically on that machine.
This is because DHCP knows NOT to give this range of IPaddresses out.
A reservation is a specific IP addresses that is tied to a certain device through its MAC address. Forexample, if
we have a workstation on the network that requires a certain IP address, but we don't want to gothrough to
trouble of assigning it statically, then we can create a reservation for it. So if the MAC address of theNIC on the
computer is AA-BB-00FF-CC-AA and we want it to maintain the IP address of 192.168.0.100 thenwe would
create a DHCP reservation under that particular
scope saying that the IP address 192.168.0.100
isreserved only for the MAC address AA-BB-00-FF-CC-AA.
http://technet.microsoft.com/en-us/magazine/ff521761.aspx http://technet.microsoft.com/en-us/library/
cc726954(v=ws.10).aspx http://www.windowsnetworking.com/kbase/WindowsTips/Windows2003/AdminTips/
Network/DHC PReservationsandExclusions.html
QUESTION 17
Your network contains an Active Directory forest. The forest contains two domains named contoso.com and
corp.contoso.com. The forest contains four domain controllers. The domain controllers are configured as
shown in the following table.

All domain controllers are DNS servers. In the corp.contoso.com domain, you plan to deploy a new domain

controller named DCS.


You need to identify which domain controller must be online to ensure that DCS can be promoted successfully
to a domain controller.
Which domain controller should you identify?
A.
B.
C.
D.

DC1
DC2
DC3
DC4

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Wrong Domain
B. Wrong Domain
C. Right domain, RID Master must be online
D. Right domain but Not needed to be online
Relative ID (RID) Master:
Allocates active and standby RID pools to replica domain controllers in the same domain. (corp.contoso.com)
Must be online for newly promoted domain controllers to obtain a local RID pool that is required to advertise or
when existing domain controllers have to update their current or standby RID pool allocation.
The RID master is responsible for processing RID pool requests from all domain controllers in a particular
domain. When a DC creates a security principal object such as a user or group, it attaches a unique Security
ID (SID) to the object. This SID consists of a domain SID (the same for all SIDs created in a domain), and a
relative ID (RID) that is unique for each security principal SID created
in a domain. Each DC in a domain is allocated a pool of RIDs that it is allowed to assign to the security
principals it creates. When a DC's allocated RID pool falls below a threshold, that DC issues a request for
additional RIDs to the domain's RID master. The domain RID master responds to the request by retrieving
RIDs from the domain's unallocated RID pool and assigns them to the pool of the requesting DC At any one
time, there can be only one domain controller acting as the RID master in the domain.

http://support.microsoft.com/kb/223346
QUESTION 18
Your network contains an Active Directory domain named contoso.com. You log on to a domain controller by
using an account named Admin1.
Admin1 is a member of the Domain Admins group.
You view the properties of a group named Group1 as shown in the exhibit. (Click the Exhibit button.) Group1 is
located in an organizational unit (OU) named OU1. You need to ensure that users from Group1 can modify the
Security settings of OU1 only. What should you do from Active Directory Users and Computers?

A.
B.
C.
D.

Modify the Managed By settings on OU1.


Right-click contoso.com and select Delegate Control.
Right-click OU1 and select Delegate Control.
Modify the Security settings of Group1.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. The distinguished name of the user that is assigned to manage this object.
B. Would delegate control to the whole domain
C. Delegates control to the OU OU1 only
D. Wrong Feature
An organizational unit is the smallest scope or unit to which you can assign Group Policy settings or delegate
administrative authority. A user can have administrative authority for all organizational units in a domain or for
a single organizational unit.
You can delegate administrative control to any level of a domain tree by creating organizational units within a
domain and delegating administrative control for specific organizational units to particular users or groups.
Administrative control can be assigned to a user or group by using the Delegation of Control Wizard or through
the Authorization Manager console. Both of these tools allow you to assign rights or permissions to particular
users or groups. http://technet.microsoft.com/en-us/library/cc758565%28v=ws.10%29.aspx http://
technet.microsoft.com/en-us/library/cc778807%28v=ws.10%29.aspx http://msdn.microsoft.com/en-us/library/
windows/desktop/ms676857(v=vs.85).aspx http://technet.microsoft.com/en-us/library/cc732524.aspx
QUESTION 19

Your network contains an Active Directory forest named contoso.com. All domain controllers currently run
Windows Server 2008 R2. You plan to install a new domain controller named DC4 that runs Windows Server
2012 R2. The new domain controller will have the following configurations:
- Schema master
- Global catalog server
- DNS Server server role
- Active Directory Certificate Services server role
You need to identify which configurations Administrators by using the Active Directory Installation Wizard.
Which two configurations should you identify? (Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.

Transfer the schema master.


Enable the global catalog server.
Install the DNS Server role
Install the Active Directory Certificate Services role.

Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
AD Installation Wizard will automatically install DNS and allows for the option to set it as a global catalog
server. ADCS and schema must be done separately.

http://technet.microsoft.com/en-us/library/hh831457.aspx
QUESTION 20
Your network contains an Active Directory domain named contoso.com. The domain contains two domain
controllers. The domain controllers are configured as shown in the following table.

In the perimeter network, you install a new server named Server1 that runs Windows Server 2012 R2. Server1

is in a workgroup.
You need to perform an offline domain join of Server1 to the contoso.com domain.
What should you do first?
A.
B.
C.
D.

Transfer the PDC emulator role to Dc1.


Run the djoin.exe command.
Run the dsadd.exe command.
Transfer the infrastructure master role to DC1.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Creates a new Active Directory computer.
B. Use djoin for offline join in the perimeter network
C. Adds specific types of objects to the directory.
D. Add the local computer to a domain or workgroup.
To perform an offline domain join, you run commands by using a new tool named Djoin.exe. You use Djoin.exe
to provision computer account data into AD DS. You also use it to insert the computer account data intothe
Windows directory of the destination computer, which is the computer that you want to join to the domain.
Create the account djoin /provision /domain winsrvtuts.wst /machine Win7 /savefile c:\yourFile.txt Run on the
target systemdjoin /requestodj /loadfile c:\yourFile.txt /windowspath c:\Windows /localos http://
technet.microsoft.com/en-us/library/ee617245.aspx http://technet.microsoft.com/en-us/library/ff793312
(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc753708(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/hh849798.aspx http://winsrvtuts.com/2011/08/off-line-domain-joinwith-djoin-exe/ http://technet.microsoft.com/en-us/library/offline-domain-join-djoin-step- bystep%28v=ws.10%
29.aspx
QUESTION 21
Your network contains an Active Directory domain named contoso.com. You discover that when you join client
computers to the domain manually, the computer accounts are created in the Computers container.
You need to ensure that new computer accounts are created automatically in an organizational unit (OU)
named Corp.
Which tool should you use?
A.
B.
C.
D.

net.exe
redircmp.exe
regedit.exe
dsadd.exe

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Used to stop/start protocols
B. Redirects the default container for newly created computers to a specified, target organizational unit
C. Modify local registry entries
D. Adds specific types of objects to the directory
Redirects the default container for newly created computers to a specified, target organizational unit (OU) so
that newly created computer objects are created in the specific target OU instead of in CN=Computers.

You must run the redircmp command from an elevated command prompt. Redircmp.exe is located in the C:
\Windows\System32 folder. You must be a member of the Domain Admins group or the Enterprise Admins
group to use this tool.
http://technet.microsoft.com/en-us/library/bb490949.aspx http://technet.microsoft.com/en-us/library/cc770619
(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc753708(v=ws.10).aspx
QUESTION 22
You have a server named Server2 that runs Windows Server 2012 R2. Server2 has the Hyper-V server role
installed. The disks on Server2 are configured as shown in the exhibit. (Click the Exhibit button.)
You create a virtual machine on Server2 named VM1.
You need to ensure that you can configure a pass-through disk for VM1.
What should you do?

A.
B.
C.
D.

Convert Disk 1 to a basic disk.


Take Disk 1 offline.
Create a partition on Disk 1.
Convert Disk 1 to a MBR disk.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks- inhyperv.aspx
Pass-through Disk Configuration
Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring the
volume be configured. The storage can either be a physical disk internal to the Hyper-V server or it can be a
Storage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest has
exclusive access to the storage, it must be placed in an Offline state from the Hyper-V server perspective

QUESTION 23
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role
installed. Server1 is connected to two Fibre Channel SANs and is configured as shown in the following table.

You have a virtual machine named VM1.


You need to configure VM1 to connect to SAN1.
What should you do first?
A.
B.
C.
D.

Add one HBA


Create a Virtual Fibre Channel SAN.
Create a Hyper-V virtual switch.
Configure network adapter teaming.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
You need your virtualized workloads to connect easily and reliably to your existing storage arrays.
WindowsServer 2012 provides Fibre Channel ports within the guest operating system, which allows you
toconnect to Fibre Channel directly from within virtual machines. This feature protects your investments inFibre
Channel, enables you to virtualize workloads that use direct access to Fibre Channel storage, allows youto
cluster guest operating systems over Fibre Channel, and provides an important new storage option forservers
hosted in your virtualization infrastructure. With this Hyper-V virtual Fibre Channel feature, you can connect to
Fibre Channel storage from within a virtualmachine. This allows you to use your existing Fibre Channel
investments to support virtualized workloads.
Support for Fibre Channel in Hyper-V guests also includes support for many related features, such as
virtualSANs, live migration, and MPIO.

http://technet.microsoft.com/en-us/library/hh831413.aspx
QUESTION 24
You work as a senior administrator at L2P.com. The L2P.com network consists of a single domain named
L2P.com. All servers on the L2P.com network have Windows Server 2012 installed, and all workstations have
Windows 8 installed.
You are running a training exercise for junior administrators.
You are currently discussing the Always Offline Mode.
Which of the following is TRUE with regards to the Always Offline Mode? (Choose all that apply.)
A. It allows for swifter access to cached files and redirected folders.
B. To enable Always Offline Mode, you have to satisfy the forest and domain functional-level requirements, as
well as schema requirements.
C. It allows for lower bandwidth usage due to users are always working offline.
D. To enable Always Offline Mode, you must have workstations running Windows 7 or Windows Server 2008
R2.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Offline Files have four modes of operation:
Online
Slow link
Auto offline
Manual offline
Offline Files transition between the three modes online, slow link and auto offline depending on connection
speed. The user can always override the automatic mode selection by manually switching to manual offline

mode.
To determine the connection speed two pings with default packet size are sent to the file server. If the average
round-trip time is below 80 ms (Windows 7) or 35 ms (Windows 8), the connection is put into online mode,
otherwise into slow link mode. The latency value of 35/80 ms is configurable through the Group Policy setting
Configure slow-link mode.
Reads, Writes and Synchronization
In online mode, changes to files are made on the file server as well as in the local cache (this induces a
performance hit - see this article for details). Reads are satisfied from the local cache (if in sync).
In slow link mode, changes to files are made in the local cache. The local cache is background- synchronized
with the file server every 6 hours (Windows 7) or 2 hours (Windows 8), by default. This can be changed
through the Group Policy setting Configure Background Sync. . In auto offline mode, all reads and writes go to
the local cache. No synchronization occurs. . In manual offline mode, all reads and writes go to the local
cache. No synchronization occurs by default, but background synchronization can be enabled through the
Group Policy setting Configure Background Sync.
http://technet.microsoft.com/en-us/library/hh968298.aspx http://helgeklein.com/blog/2012/04/windows-7-offlinefiles-survival-guide/
QUESTION 25
Your network contains an Active Directory domain named contoso.com. The domain contains a domain
controller named DC1 that runs Windows Server 2012 R2. You need to configure a central store for the Group
Policy Administrative Templates.
What should you do on DC1?
A.
B.
C.
D.

From Server Manager, create a storage pool.


From Windows Explorer, copy the PolicyDefinitions folder to the SYSVOL\contoso.com\policies folder.
From Server Manager, add the Group Policy Management feature
From Windows Explorer, copy the PolicyDefinitions folder to the NETLOGON share.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Create Disk Storage Pool
B. PolicyDefinitions folder in SYSVOL
C. Group Policy Management is a console for GPO Mgmt
D. Folder is for logon scripts
PolicyDefinitions folder within the SYSVOL folder hierarchy. By placing the ADMX files in this directory,they are
replicated to every DC in the domain; by extension, the ADMX-aware Group Policy ManagementConsole in
Windows Vista, Windows 7, Windows Server 2008 and R2 can check this folder as an additionalsource of
ADMX files, and will report them accordingly when setting your policies.
By default, the folder is not created. Whether you are a single DC or several thousand, I would
stronglyrecommend you create a Central Store and start using it for all your ADMX file storage. It really does
work well.
The Central Store To take advantage of the benefits of .admx files, you must create a Central Store in the
SYSVOL folder ona domain controller. The Central Store is a file location that is checked by the Group Policy
tools. The GroupPolicy tools use any .admx files that are in the Central Store. The files that are in the Central
Store are laterreplicated to all domain controllers in the domain. To create a Central Store for .admx and .adml
files, create a folder that is named PolicyDefinitions in thefollowing location:
\\FQDN\SYSVOL\FQDN\policies
Note: FQDN is a fully qualified domain name.
http://tigermatt.wordpress.com/tag/policydefinitions/
http://support.microsoft.com/kb/929841/en-us
http://www.virtuallyimpossible.co.uk/how-to-create-a-group-policy-central-store/ http://support.microsoft.com/
kb/2741591/en-us

QUESTION 26
You install Windows Server 2012 R2 on a standalone server named Server1.
You configure Server1 as a VPN server.
You need to ensure that client computers can establish PPTP connections to Server1. Which two firewall rules
should you create? (Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
E.
F.

An inbound rule for protocol 47


An outbound rule for protocol 47
An inbound rule for TCP port 1723
An inbound rule for TCP port 1701
An outbound rule for TCP port 1723
An outbound rule for TCP port 1701

Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
To enable VPN tunnels between individual host computers or entire networks that have a firewall between
them, you must open the following ports:
PPTP
To allow PPTP tunnel maintenance traffic, open TCP 1723. To allow PPTP tunneled data to pass through
router, open Protocol ID 47. http://www.windowsitpro.com/article/pptp/which-ports-do-you- need-to-open-on-afirewall-to- allow-pptp-andl2tp-over-ipsec-vpn-tunnels--46811 If you use a personal firewall or a broadband
router, or if there are routers or firewalls between the VPN client and the VPN server, the following ports and
protocol must be enabled for PPTP on all firewalls and routers that are between the VPN client and the VPN
server:
Client ports Server port Protocol
1024-65535/TCP 1723/TCP PPTP
Additionally, you must enable IP PROTOCOL 47 (GRE).
http://support.microsoft.com/kb/314076/en-us
QUESTION 27
Your network contains an Active Directory domain named adatum.com. The computer accounts for all member
servers are located in an organizational unit (OU) named Servers.
You link a Group Policy object (GPO) to the Servers OU.
You need to ensure that the domain's Backup Operators group is a member of the local Backup Operators
group on each member server.
The solution must not remove any groups from the local Backup Operators groups.
What should you do?
A. Add a restricted group named adatum\Backup Operators.
Add Backup Operators to the This group is a member of list.
B. Add a restricted group named adatum\Backup Operators.
Add Backup Operators to the Members of this group list.
C. Add a restricted group named Backup Operators.
Add adatum\Backup Operators to the This group is a member of list.
D. Add a restricted group named Backup Operators.
Add adatum\Backup Operators to the Members of this group list.
Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
A. The Member Of list specifies which other groups the restricted group should belong to B. Needs to be
added to member of list
C. Wrong group
D. Wrong group
Restricted groups allow an administrator to define two properties for security-sensitive groups (that
is,"restricted" groups).
The two properties are Members and Member Of . The Members list defines who should and should not
belongto the restricted group. The Member Of list specifies which other groups the restricted group should
belong to.
When a restricted Group Policy is enforced, any current member of a restricted group that is not on
theMembers list is removed. Any user on the Members list which is not currently a member of the
restrictedgroup is added.
The Restricted Groups folder is available only in Group Policy objects associated with domains, OUs,and sites.
The Restricted Groups folder does not appear in the Local Computer Policy object. If a Restricted Group is
defined such that it has no members (that is, the Members list is empty), then allmembers of the group are
removed when the policy is enforced on the system. If the Member Of list is emptyno changes are made to any
groups that the restricted group belongs to. In short, an empty Members listmeans the restricted group should
have no members while an empty Member Of list means "don't care" whatgroups the restricted group belongs
to.

http://technet.microsoft.com/en-us/library/cc957640.aspx
QUESTION 28
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012
R2. An application named Appl.exe is installed on all client computers. Multiple versions of Appl.exe are
installed on different client computers. Appl.exe is digitally signed. You need to ensure that only the latest
version of Appl.exe can run on the client computers.
What should you create?
A.
B.
C.
D.

An application control policy packaged app rule


A software restriction policy certificate rule
An application control policy Windows Installer rule
An application control policy executable rule

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. A publisher rule for a Packaged app is based on publisher, name and version B. You can create a certificate
rule that identifies software and then allows or does not allow the software torun, depending on the security
level.
C. For .msi or .msp
D. Executable Rules, for .exe and can be based on Publisher, Product name, filename and version. Use
Certificate Rules on Windows Executables for Software Restriction Policies This security setting determines if
digital certificates are processed when a user or process attempts to runsoftware with an .exe file name
extension. This security settings is used to enable or disable certificate rules, atype of software restriction
policies rule. With software restriction policies, you can create a certificate rule thatwill allow or disallow
software that is signed by Authenticode to run, based on the digital certificate that isassociated with the
software. In order for certificate rules to take effect, you must enable this security setting. When certificate
rules are enabled, software restriction policies will check a certificate revocation list (CRL) tomake sure the
software's certificate and signature are valid. This may decrease performance when start signedprograms. You
can disable this feature. On Trusted Publishers Properties, clear the Publisher and Timestampcheck boxes.

http://technet.microsoft.com/en-us/library/dd759068.aspx http://technet.microsoft.com/en-us/library/
hh994588.aspx http://www.grouppolicy.biz/2012/08/how-manage-published-a-k-a-metro-apps-in-windows8using- grouppolicy/
http://technet.microsoft.com/en-us/library/hh994597.aspx#BKMK_Cert_Rules
QUESTION 29
Your network contains an Active Directory domain named contoso.com.
All domain controllers run Windows Server 2012 R2.
You need to ensure that the local Administrator account on all computers is renamed to L_Admin.
Which Group Policy settings should you modify?
A.
B.
C.
D.

Security Options
User Rights Assignment
Restricted Groups
Preferences

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Allows configuration of computers
B. User Rights Assignment policies determines which users or groups have logon rights or privileges on
thecomputer
C. Restricted Groups defines what member or groups should exist as part of a group D. With Preferences,
local and domain accounts can be added to a local group without affecting the existingmembers of the group In
Group Policy Object Editor, click Computer Configuration, click Windows Settings, click Security Settings,click
Local Policies, and then click Security Options. In the details pane, double-click Accounts: Rename
administrator account.

http://technet.microsoft.com/en-us/library/cc747484(v=ws.10).aspx In Group Policy Object Editor, click


Computer Configuration, click Windows Settings, click Security Settings, click Local Policies, and then click
Security Options. In the details pane, double-click Accounts: Rename administrator account.
QUESTION 30
You have a server that runs Windows Server 2012 R2. The disks on the server are configured as shown in the
exhibit. (Click the Exhibit button.)
You need to create a storage pool that contains Disk 1 and Disk 2.
What should you do first?

A.
B.
C.
D.

Delete volume E
Convert Disk 1 and Disk 2 to dynamic disks
Convert Disk 1 and Disk 2 to GPT disks
Create a volume on Disk 2

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Storage Pools use unallocated space
There is no way to create a storage pool with existing data. Storage pools are only a collection ofdrives that
are managed by windows. http://technet.microsoft.com/en-us/library/ff399688.aspx http://
technet.microsoft.com/en-us/library/hh758075.aspx
QUESTION 31
You have a server named Server1 that runs Windows Server 2012 R2.
You add a 4-TB disk named Disk 5 to Server1.
You need to ensure that you can create a 3-TB volume on Disk 5.
What should you do?

A.
B.
C.
D.

Create a storage pool.


Convert the disk to a dynamic disk.
Create a VHD, and then attach the VHD.
Convert the disk to a GPT disk.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
MBR max is 2TB, the disk must be GPT
For any hard drive over 2TB, we need to use GPT partition. If you have a disk larger than 2TBsize, the rest
ofthe disk space will not be used unless you convert it to GPT. An existing MBR partition can't be converted to
GPT unless it is completely empty; you must either deleteeverything and convert or create the partition as
GPT. It is not possible to boot to a GPT partition, impossible to convert MBR to GPT without data loss. http://
msdn.microsoft.com/en-us/library/windows/hardware/gg463525.aspx
QUESTION 32
You have a server named Server1 that has a Server Core installation of Windows Server 2008 R2. Server1
has the DHCP Server server role and the File Server server role installed. You need to upgrade Server1 to
Windows Server 2012 R2 with the graphical user interface (GUI). The solution must meet the following
requirements:
- Preserve the server roles and their configurations.
- Minimize Administrative effort.
What should you do?
A. On Server1, run setup.exe from the Windows Server 2012 R2 installation media and select Server with a
GUI.
B. Start Server1 from the Windows Server 2012 R2 installation media and select Server Core Installation.
When the installation is complete, add the Server Graphical Shell feature.
C. Start Server1 from the Windows Server 2012 R2 installation media and select Server with a GUI.
D. On Server1, run setup.exe from the Windows Server 2012 R2 installation media and select Server Core
Installation.
When the installation is complete, add the Server Graphical Shell feature
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Server is on 2008 R2 core, must install 2012 R2 core and then GUI B. Not least effort
C. Not least effort
D. Upgrade to 2012 R2 and install GUI shell
http://technet.microsoft.com/en-us/library/jj574204.aspx Upgrades that switch from a Server Core installation to
the Server with a GUI mode of Windows Server 2012 R2 in one step (and vice versa) are not supported.
However, after upgrade is complete, Windows Server 2012 R2 allows you to switch freely between Server
Core and Server with a GUI modes. For more information about these installation options, how to convert
between them, and how to use the new Minimal Server Interface and Features on Demand, see http://
technet.microsoft.com/library/hh831786.
QUESTION 33
Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2.

You need to install the Remote Desktop Services server role on Server2 remotely from Server1.
Which tool should you use?
A.
B.
C.
D.

The dsadd.exe command


The Server Manager console
The Remote Desktop Gateway Manager console
The Install-RemoteAccess cmdlet

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
. Adds specific types of objects to the directory
B. You can manage remote server by Server Manager and install roles/features C. Remote Desktop Gateway
(RD Gateway) is a role service that enables authorized remote users to connectto resources on an internal
corporate or private network, from any Internet-connected device that can run theRemote Desktop Connection
(RDC) client. D. Performs prerequisite checks for DirectAccess (DA) to ensure that it can be installed, installs
DA for remoteaccess (RA) (includes management of remote clients) or for management of remote clients only,
and installsVPN (both Remote Access VPN and siteto-site VPN).

http://technet.microsoft.com/en-us/library/cc753708(v=ws.10).aspx http://technet.microsoft.com/en-us/library/
hh831456.aspx http://technet.microsoft.com/en-us/library/cc725706.aspx http://technet.microsoft.com/en-us/
library/hh918408(v=wps.620).aspx

QUESTION 34
You have a server named Server1 that runs a full installation of Windows Server 2012 R2. You need to
uninstall the graphical user interface (GUI) on Server1. You must achieve this goal by using the minimum
amount of Administrative effort.
What should you do?
A.
B.
C.
D.

Reinstall Windows Server 2012 R2 on the server.


From Server Manager, uninstall the User Interfaces and Infrastructure feature.
From Windows PowerShell, run Uninstall-WindowsFeature PowerShell-ISE
From Windows PowerShell, run Uninstall-WindowsFeature Desktop-Experience.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Not least effort
B. Quick and Easy
C. Uninstalls PS-ISE
D. Doesn't remove all GUI components

http://www.petri.co.il/switching-gui-server-core-windows-server-2012.htm
QUESTION 35
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V
server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is
configured as shown in the following table.

You install Windows Server 2012 R2 on VM2 by using Windows Deployment Services (WDS). You need to
ensure that the next time VM2 restarts, you can connect to the WDS server by using PXE.
Which virtual machine setting should you configure for VM2?
A.
B.
C.
D.
E.
F.
G.
H.
I.
J.
K.

NUMA topology
Resource control
Resource metering
Virtual Machine Chimney
The VLAN ID
Processor Compatibility
The startup order
Automatic Start Action
Integration Services
Port mirroring
Single-root I/O virtualization

Correct Answer: G
Section: (none)
Explanation
Explanation/Reference:
Explanation:
G. Configure the BIOS of the computer to enable PXE boot, and set the boot order so that it is booting from the
network is first

QUESTION 36
Your network contains an Active Directory domain named contoso.com. The domain contains two domain
controllers. The domain controllers are configured as shown in the following table.

In the perimeter network, you install a new server named Server1 that runs a Server Core Installation of
Windows Server 2012 R2.
You need to join Server1 to the contoso.com domain.
What should you use?
A.
B.
C.
D.

The New-ADComputer cmdlet


The djoin.exe command
The dsadd.exe command
The Add-Computer cmdlet

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Creates a new Active Directory computer.
B. Use djoin for offline join in the perimeter network
C. Adds specific types of objects to the directory.
D. Add the local computer to a domain or workgroup.
http://technet.microsoft.com/en-us/library/ee617245.aspx http://technet.microsoft.com/en-us/library/ff793312
(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc753708(v=ws.10).aspx http://
technet.microsoft.com/en-us/library/hh849798.aspx
QUESTION 37

Your network contains an Active Directory domain named adatum.com. The domain contains three domain
DC3 loses network connectivity due to a hardware failure.
You plan to remove DC3 from the domain.
You log on to DC3.
You need to identify which service location (SRV) records are registered by DC3.
What should you do?

A.
B.
C.
D.

Open the %windir%\system32\config\netlogon.dns file.


Run dcdiag /test:dns
Open the %windir%\system32\dns\backup\adatum.com.dns file.
Run ipconfig /displaydns.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Netlogon service creates a log file that contains all the locator resource records and places the logfile in the
following location:
B. Analyzes the state of domain controllers in a forest or enterprise and reports any problems to help
introubleshooting.
C. dns backup file
D. used to display current resolver cache content You can verify SRV locator resource records by viewing
netlogon.dns, located in the
%systemroot%\System32\Config folder.
The SRV record is a Domain Name System (DNS) resource record that is used to identify computers that
hostspecific services.
SRV resource records are used to locate domain controllers for Active Directory.
You can use Notepad, to view this file.
The first record in the file is the domain controller's Lightweight Directory Access Protocol (LDAP) SRV record.
This record should appear similar to the following:
_ldap._tcp.Domain_Name

http://support.microsoft.com/kb/816587/en-us
http://technet.microsoft.com/en-us/library/cc959303.aspx http://technet.microsoft.com/en-us/library/cc731968
(v=ws.10).aspx
QUESTION 38
Your network contains an Active Directory forest that contains three domains. A group named Group1 is
configured as a domain local distribution group in the forest root domain. You plan to grant Group1 read-only
access to a shared folder named Share1. Share1 is located in a child domain.
You need to ensure that the members of Group1 can access Share1.
What should you do first?
A.
B.
C.
D.

Convert Group1 to a global distribution group.


Convert Group1 to a universal security group.
Convert Group1 to a universal distribution group.
Convert Group1 to a domain local security group

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Distribution Groups only used for email
B, Universal can be used for any domain or forest
C. Distribution Groups only used for email
D. Permissions can be assigned only within the same domain as the parent domain local group Group scope
Universal can be assigned permissions in any domain or forest.

http://technet.microsoft.com/en-us/library/cc781446(v=ws.10).aspx http://technet.microsoft.com/en-us/library/
cc755692(v=ws.10).aspx
QUESTION 39
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows
Server 2008 R2. One of the domain controllers is named DCI. The network contains a member server named
Server1 that runs Windows Server 2012 R2. You need to promote Server1 to a domain controller by using
install from media (IFM).
What should you do first?
A.
B.
C.
D.
E.

Create a system state backup of DC1.


Create IFM media on DC1.
Upgrade DC1 to Windows Server 2012 R2.
Run the Active Directory Domain Services Configuration Wizard on Server1.
Run the Active Directory Domain Services Installation Wizard on DC1.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Backs up system state data to be restored
C. Only valid option. You could install ADDS role on Server 1 and run ADDS configuration wizard andadd DC
to existing domain
D. Need to add ADDS role first
E. Wrong server
Installation from media does not work across different operating system versions. In other words, you must use
a Windows Server 2012 R2 domain controller to generate installation media to usefor another Windows Server
2012 R2 domain controller installation. We can use the Install from media (IFM) option to install an Additional
Domain Controller in an existing domainis the best option such as a branch office scenario where network is
slow, unreliable and costly. IFM will minimize replication traffic during the installation because it uses restored
backup files to populate theAD DS database. This will significantly reduce the amount of traffic copied over the
WAN link.
Things to remember:
If you are deploying your first Domain Controller in the domain, you cannot use IFM. The OS will need to
match the IFM media. (If you create a 2008 R2 IFM, promote a 2008 R2 DC) If you are creating a DC that will
be a Global Catalog Server, create your IFM on a Global Catalog Server.
If you are creating a DC that will be a DNS Server, create your IFM on a DNS Server. If you want to copy the
SYSVOL, the DC on which you generate the installation media and the new DC mustbe at least running
Windows Server 2008 with Service Pack 2 or Windows Server 2008 R2. Membership of the Domain Admins
group is the minimum required to complete IFM. http://www.brandonlawson.com/active-directory/deployingdomain-controllers-with-installfrom- media-ifm/

http://technet.microsoft.com/en-us/library/jj574166.aspx http://technet.microsoft.com/en-us/library/cc770654%
28v=ws.10%29.aspx http://technet.microsoft.com/en-us/library/jj574134.aspx Media used by the IFM option is
created with Windows Server Backup or Ntdsutil.exe from another existingWindows Server 2012 R2 computer
only You cannot use a Windows Server 2008 R2 or previous operating system to create media for a Windows
Server 2012 R2 domain controller.
QUESTION 40
Your network contains an Active Directory domain named contoso.com. The domain contains 100 servers.
The servers are contained in a organizational unit (OU) named ServersOU. You need to create a group named
Group1 on all of the servers in the domain. You must ensure that Group1 is added only to the servers.
What should you configure?
A.
B.
C.
D.

a Local Users and Groups preferences setting in a Group Policy linked to the Domain Controllers OU
a Restricted Groups setting in a Group Policy linked to the domain
a Local Users and Groups preferences setting in a Group Policy linked to ServersOU
a Restricted Groups setting in a Group Policy linked to ServersOU

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. This would add the group to the wrong OU
B. This would affect the whole domain and would effect member of the group C. allows you to centrally
manage local users and groups on domain member computers and is this isthe correct OU for the GPO
change
D. Restricted Groups defines what member or groups should exist as part of a group Why use Group Policy
preferences?
Unlike Group Policy settings, which Apply to both local computer policy and Active Directory policy,
GroupPolicy preferences only Apply to Active Directory policy. You use preferences to configure many areas of
theOS, including:
System devices, such as USB ports, floppy drives and removable media Network shares and mapping network
shares to drive letters System and user environment variables User and group accounts for the local computer
VPN and dial-up networking connections
Printer configuration and mapping
Registry settings, schedule tasks and system services
Settings for Folder Options, Internet Options and Regional and Language Options Settings for power schemes
and power management
Start Menu properties and menu items

http://www.grouppolicy.biz/2010/01/how-to-use-group-policy-preferences-to-secure- localadministrator-groups/
http://technet.microsoft.com/en-us/magazine/hh848751.aspx http://technet.microsoft.com/en-us/library/
cc957640.aspx http://technet.microsoft.com/en-us/library/cc731972.aspx
QUESTION 41
Your network contains an Active Directory domain named adatum.com. The domain contains several thousand
member servers that run Windows Server 2012 R2. All of the computer accounts for the member servers are
in an organizational unit (OU) named ServersAccounts.
Servers are restarted only occasionally.
You need to identify which servers were restarted during the last two days.
What should you do?
A.
B.
C.
D.

Run dsquery computerand specify the -staiepwdpara meter.


Run Get-ADComputerand specify the SearchScope parameter.
Run Get-ADComputerand specify the IastLogonproperty.
Run dsquery serverand specify the -oparameter

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 42
Your network contains an Active Directory domain named contoso.com. You log on to a domain controller by
using an account named Admin1. Admin1 is a member of the Domain Admins group.
You view the properties of a group named Group1 as shown in the exhibit. (Click the Exhibit button.)
Group1 is located in an organizational unit (OU) named OU1. You need to ensure that you can modify the

Security settings of Group1 by using Active Directory Users and Computers.


What should you do from Active Directory Users and Computers?

A.
B.
C.
D.

From the View menu, select Users, Contacts, Groups, and Computers as containers.
Right-click OU1 and select Delegate Control
From the View menu, select Advanced Features.
Right-click contoso.com and select Delegate Control.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
From ADUC select view toolbar then select advanced features When you open up the ADUC in a default
installation of Active Directory, you are only presented with the basiccontainers. These basic containers
include the only organizational unit (OU), which is the Domain Controllers OU, as wellas the other containers
such as Users and Computers. To see more in-depth containers, you need to configure the ADUC by going to
the View option on thetoolbar, then selecting Advanced Features. This will refresh the view within the ADUC
and add some new containers. There are no hidden (or Advanced)OUs that will show up when you configure
the ADUC in this way. Viewing ADUC Advanced Settings:
http://searchwindowsserver.techtarget.com/tip/Viewing-advanced-settings-in-ActiveDirectory- Users-andComputers
QUESTION 43
Your network contains an Active Directory domain named contoso.com. The domain contains two domain
controllers named DC1 and DC2. You install Windows Server 2012 on a new computer named DC3. You need
to manually configure DC3 as a domain controller.

Which tool should you use?


A.
B.
C.
D.

Server Manager
winrm.exe
Active Directory Domains and Trusts
dcpromo.exe

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. using the Add Roles Wizard in Server Manager, followed by the Active Directory Domain Services
Configuration Wizard
B. winrm is the server side service for remote managment C. used for trust between multiple domains
D. Dcpromo.exe has been deprecated.
In Windows Server 2012 R2, if you run dcpromo.exe (without anyparameters) from a command prompt, you
receive a message directing you to Server Manager

http://technet.microsoft.com/en-us/library/hh472162.aspx#BKMK_GUI http://technet.microsoft.com/en-us/
library/dd163506.aspx http://technet.microsoft.com/en-us/library/hh831568.aspx
QUESTION 44
You have a server named Core1 that has a Server Core Installation of Windows Server 2012 R2. Core1 has
the Hyper-V server role installed Core1 has two network adapters from different third- party hardware vendors.
You need to configure network traffic failover to prevent connectivity loss if a network adapter fails.
What should you use?

A.
B.
C.
D.

New-NetSwitchTeam
Add-NetSwitchTeamMember
Install-Feature
netsh.exe

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Creates a new switch team
B. Adds a network adapter member to an existing switch team C. Not a valid cmdlet
D. Network shell (netsh) is a command-line utility that allows you to configure and display the status of various
network communications server role

http://technet.microsoft.com/en-us/library/jj553814.aspx http://technet.microsoft.com/en-us/library/jj553811
(v=wps.620).aspx http://technet.microsoft.com/en-us/library/cc725935(v=ws.10).aspx
QUESTION 45
You have a server named Server1 that runs Windows Server 2012 R2.
You connect three new hard disks to Server1.
You need to create a storage space that contains the three disks. The solution must meet the following
requirements:
- Provide fault tolerance if a single disk fails.
- Maximize the amount of files that can be stored in the storage space.
What should you create?
A.
B.
C.
D.

A simple space
A spanned volume
A mirrored space
A parity space

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Stripes data across a set of pool disks, and is not resilient to any disk failures. B. A spanned volume is a
dynamic volume consisting of disk space on more than one physical disk and not fault tolerant
C. Fault tolerant but Not max space
D. Fault tolerant and better space ratio
Parity spaces are designed for capacity efficiency and increased resiliency. Parity spaces are best suited for
archival data and streaming media, such as music and videos. http://social.technet.microsoft.com/wiki/
contents/articles/11382.storage-spaces-frequently-asked- questions-faq.aspx
http://social.technet.microsoft.com/wiki/contents/articles/15198.storage-spaces-overview.aspx http://
technet.microsoft.com/en-us/library/cc772180.aspx
QUESTION 46

You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1. You need to
add a graphical user interface (GUI) to Server1.
Which tool should you use?
A.
B.
C.
D.

The setup.exe command


The dism.exe command
The imagex.exe command
The Add-WindowsPackage cmdlet

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The DISM command is called by the Add-WindowsFeature command. Here is the systax for DISM:
Dism /online /enable-feature /featurename:ServerCore-FullServer /featurename:ServerGui-Shell /
featurename:Server-Gui-Mgmt

QUESTION 47
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has five network adapters.
Three of the network adapters an connected to a network named LAN1. The two other network adapters are
connected to a network named LAN2. You need to create a network adapter team from the three network
adapters connected to LAN 1.
Which tool should you use?
A.
B.
C.
D.

Routing and Remote Access


Network and Sharing Center
Server Manager
Network Load Balancing Manager

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
Explanation:

http://technet.microsoft.com/en-us/library/hh831648.aspx
QUESTION 48
You have a server named Server1 that runs Windows Server 2012 R2. You need to remove Windows
Explorer, Windows Internet Explorer, and all related components and files from Server1.
What should you run on Server1?
A.
B.
C.
D.

Uninstall-WindowsFeature Server-Gui-Mgmt-Infra Remove


Uninstall-WindowsFeature Server-Gui-Shell Remove
msiexec.exe /uninstall iexplore.exe /x
msiexec.exe /uninstall explorer.exe /x

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Would be a server core install
B. No IE or taskbar, explorer or control panel
C. Would leave components
D. Would leave components
In Windows Server 2012 R2, you can remove the Server Graphical Shell, resulting in the "Minimal
ServerInterface".
This is similar to a Server with a GUI installation, but Internet Explorer 10, Windows Explorer, the desktop,
andthe Start screen are not installed.
Microsoft Management Console (MMC), Server Manager, and a subset of Control Panel are still present.

If the server has a full installation of Windows Server, and I need to bring the server down to minimal
serverinterface, I only need to remove the Server-GUI-Shell.

http://technet.microsoft.com/en-us/library/hh831786(v=ws.11).aspx
QUESTION 49
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role
installed. On Server1, you create a virtual machine named VM1.
VM1 has a legacy network adapter.
You need to assign a specific amount of available network bandwidth to VM1.
What should you do first?
A.
B.
C.
D.

Remove the legacy network adapter, and then run the Set-VMNetworkAdaptercmdlet.
Add a second legacy network adapter, and then run the Set-VMNetworkAdoptercmdlet
Add a second legacy network adapter, and then configure network adapter teaming.
Remove the legacy network adapter, and then add a network adapter

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Set-VMNetworkAdaptercmdlet configures features of the virtual network adapter in a virtual machine or the
management operating system
B. The legacy network adapter doesn't support bandwidth management C. The legacy network adapter doesn't
support bandwidth management D. Add a New network adapter
The legacy network adapter doesn't support bandwidth management

http://technet.microsoft.com/en-us/library/hh848457(v=wps.620).aspx http://www.techrepublic.com/blog/
networking/set-bandwidth-limits-for-hyper-v-vms-withwindows- server-2012/5924
QUESTION 50
Your network contains an Active Directory domain named adatum.com. The domain contains a server named
Server1 that runs Windows Server 2012 R2. On a server named Core1, you perform a Server Core Installation
of Windows Server 2012 R2.
You join Core1 to the adatum.com domain.
You need to ensure that you can use Event Viewer on Server1 to view the event logs on Core1.
What should you do on Core1?
A.
B.
C.
D.

Run the Enable-NetFirewallRulecmdlet.


Run sconfig.exeand configure remote management
Run the Disable-NetFirewallRulecmdlet.
Run sconfiq.exeand configure the network settings.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Get Latest & Actual 70-410 Exam's Question and Answers from Passleader.
Explanation:
A. Allows MMC snap in for Event Viewer.
B. Modifies service entries
C. Would Disable a firewall rule which was enabled
D. Modifies service entries
Enable-NetFirewallRule -DisplayGroup "Remote Event Log Management"

http://technet.microsoft.com/en-us/library/cc990290(v=ws.10).aspx http://technet.microsoft.com/en-us/library/
jj574205.aspx http://mikefrobbins.com/2013/02/28/use-powershell-to-remotely-enable-firewall-exceptions-onwindows-server-2012/
QUESTION 51
Your network contains a file server named Server1 that runs Windows Server 2012 R2.
All client computers run Windows 8.
You need to ensure that when users are connected to the network, they always use local offline files that are
cached from Server1.
Which Group Policy setting should you configure?
A.
B.
C.
D.

Configure slow-link mode.


Configure Slow link speed
Enable file synchronization on costed networks
Turn on economical application of Administratively assigned Offline Files.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Offline Files to provide faster access to cached files and redirected folders. B. Defines a slow connection for
purposes of Applying and updating Group Policy. C. automatically tracks roaming and bandwidth usage limits
while on metered connections D. Lists network files and folders that are always available for offline use. This
policy makes the specified filesand folders available offline to users of the computer. When Offline Files is

operating in the slow-link mode, all network file requests are satisfied from the OfflineFiles cache. This is
similar to a user working offline. If you enable this policy setting, Offline Files uses the slow-link mode if the
network throughput between theclient and the server is below (slower than) the Throughput threshold
parameter, or if the round-trip networklatency is above (slower than) the Latency threshold parameter.

http://technet.microsoft.com/en-us/library/hh968298.aspx http://technet.microsoft.com/en-us/library/
cc957631.aspx http://technet.microsoft.com/en-us/library/jj127408.aspx http://www.group-policy.com/ref/
policy/2229/Configure_slow-link_mode

QUESTION 52
Your network contains an Active Directory domain named contoso.com. All servers run either Windows Server
2008 R2 or Windows Serve 2012 R2. All client computers run either Windows 7
or Windows 8. The domain contains a member server named Server1 that runs Windows Server 2012 R2.
Server1 has the File and Storage Services server role installed.
On Server1, you create a share named Share1.
You need to ensure that users can use Previous Versions to restore the files in Share1.
What should you configure on Server1?
A.
B.
C.
D.

The Shadow Copies settings


A Windows Server Backup schedule
A data recovery agent
The Recycle Bin properties

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Enable and schedule shadow copies for Share1
B. The backup doesn't give users access until files are restored D. No settings for file version
http://technet.microsoft.com/en-us/library/cc786104(v=ws.10).aspx
QUESTION 53
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Print and Document
Services server role installed. Server1 is connected to two identical print devices. You need to ensure that
users can submit print jobs to the print devices. The solution must ensure that if one print device fails, the print
jobs will print automatically on the other print device.
What should you do on Server1?
A.
B.
C.
D.

Add two printers and configure the priority of each printer.


Add one printer and configure printer pooling.
Install the Network Load Balancing (NLB) feature, and then add one printer.
Install the Failover Clustering feature, and then add one printer

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. expedite documents that need to be printed immediately B. A printing pool is one logical printer connected
to multiple printers through multiple ports of theprint server. The printer that is idle receives the next document
sent to the logical printer. Whenprinting to a printer pool, the spooler will send waiting jobs to alternate ports. If
the original or alternateports are not available
C. NLB for printing is not supported
D. Would need 2 nodes
A printing pool is one logical printer connected to multiple printers through multiple ports of the print server.
The printer that is idle receives the next document sent to the logical printer. This is useful in a network with a
high volume of printing because it decreases the time users wait for theirdocuments.
A printing pool also simplifies administration because multiple printers can be managed from the same
logicalprinter on a server. If one device within a pool stops printing, the current document is held at that device.
The succeedingdocuments print to other devices in the pool, while the delayed document waits until the
nonfunctioningprinter is fixed. Efficient printer pools have the following characteristics:
All printers in the pool are the same model.
Printer ports can be of the same type or mixed (parallel, serial, and network). It is recommended that all

printers be in one location. Because it is impossible to predict which printer willreceive the document, keep all
printers in a pool in a single location. Otherwise, users might have a hard timefinding their printed document.
http://technet.microsoft.com/en-us/library/cc757086(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/cc784619(v=ws.10).aspx http://technet.microsoft.com/en-us/library/
cc958172.aspx You can create a printing pool to automatically distribute print jobs to the next available printer.
A printing poolis one logical printer connected to multiple printers through multiple ports of the print server. The
printer that isidle receives the next document sent to the logical printer.
QUESTION 54
You have a server named Server2 that runs Windows Server 2012 R2. You open Server Manager on Server2
as shown in the exhibit. (Click the Exhibit button.) The Everyone group has read share permission and read
NTFS permission to Sources. You need to ensure that when users browse the network, the Sources share is
not visible.
What should you do?

A. From the properties of the Sources folder, remove the Sources share, and then share the Sources folder
as Sources$
B. From the properties of the Sources folder, deny the List Folder Contents permission for the Everyone group
C. From the properties of the Sources share, configure access-based enumeration

D. From the properties of the Sources folder, configure the hidden attribute
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. need to remove the old share, $ creates a hidden share B. This would deny everyine
C. This feature allows users of Windows Server 2003-Based file servers to list only the files and folders
towhich they have access when browsing content on the file server D. This would hide the physical folder not
the share
A hidden share is identified by a dollar sign ($) at the end of the share name Hidden shares are not
listed when you look through the shares on a computer or use the "net view" command Why Use Hidden
Shares? Using hidden shares on your network is useful if you do not want a shared folder or drive on the
network to beeasily accessible. Hidden shares can add another layer of protection for shared files against
unauthorizedpeople connecting to your network. Using hidden shares helps eliminate the chance for people to
guess yourpassword (or be logged into an authorized Windows account) and then receive access to the
shared resource.

http://support.microsoft.com/kb/314984
http://technet.microsoft.com/en-us/library/cc784710(v=ws.10).aspx
QUESTION 55
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Print and
Document Services server role installed.
You connect a new print device to the network.
The marketing department and the sales department will use the print device. You need to provide users from
both departments with the ability to print to the network print device. The solution must ensure that if there are
multiple documents queued to print, the documents from the sales users print before the documents from the
marketing users.
What should you do on Server1?

A. Add two printers.


Modify the priorities of each printer and the security settings of each printer
B. Add two printers and configure printer pooling
C. Add one printer and configure printer pooling.
D. Add one printer.
Modify the printer priority and the security settings
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc738090(v=ws.10).aspx To set different print priority to different
groups
Open Printers and Faxes.
Right-click the printer you want to set, click Properties, and then click the Advanced tab. In Priority, click the up
or down arrows, and then click OK. Or, type a priority level, where 1 is the lowest level and 99 is the highest,
and then click OK. Click Add Printer to add a second logical printer for the same physical printer. For
instructions, see Related Topics.
Click the Advanced tab.
In Priority, set a priority higher than that of the first logical printer. Instruct the regular group of users to use the
first logical printer name and the group with higher priority to use the second logical printer name. Set the
appropriate permissions for the different groups.
QUESTION 56
Your network contains an Active Directory domain named contoso.com. The network contains a server named
Server1 that runs Window Server 2012 and a server named Server2 that runs Windows Server 2008 R2
Service Pack 1 (SP1). Server1 and Server2 are member server. You need to ensure that you can manage
Server2 from Server1 by using Server Manager. Which two tasks should you perform? (Each correct answer
presents part of the solution. Choose two.)
A.
B.
C.
D.
E.

Install Remote Server Administration Tools on Server1.


Install Windows Management Framework 3.0 on Server2.
Install the Windows PowerShell 2.0 engine on Server1.
Install Microsoft .NET Framework 4 on Server2.
Install Remote Server Administration Tools on Server2

Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Explanation:
Windows Server 2012 can manage Windows Server 2012 R2, Hyper-V Server 2012 ,Server 2008 SP2 and
Server 2008 R2 SP1
These instructions explain how to install:
Install the full installation of Microsoft .NET Framework 4.0 (dotNetFx40_Full_setup.exe) or, install Microsoft
.NET Framework 4.5 (dotNetFx45_Full_setup.exe) Install Windows Management Framework 3.0
Security Note By default, Server Manager and Windows PowerShell remote management is enabled in
Windows Server 2012 R2.

http://technet.microsoft.com/en-us/library/hh831456.aspx http://blogs.technet.com/b/keithmayer/
archive/2012/10/02/managing-windows-server-2008-sp2- and-r2- from-windows-server-2012-servermanager.aspx#.UaSV9djxkf8
http://technet.microsoft.com/en-us/library/
hh847837.aspx#BKMK_InstallingOnWindows7andWindowsServer2008R2
QUESTION 57
Your infrastructure divided in 2 sites.
You have a forest root domain and child domain. There is only one DC on site 2 with no FSMO roles. The link
goes down to site 2 and no users can log on.
What FSMO roles you need on to restore the access?
A.
B.
C.
D.

Infrastructure master
RID master
Domain Naming master
PCD emulator

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
D. The PDC emulator is used as a reference DC to double-check incorrect passwords and it also receives new
password changes.
PDC Emulator is the most complicated and least understood role, for it runs a diverse range of critical tasks. It
is a domain-specific role, so exists in the forest root domain and every child domain. Password changes and
account lockouts are immediately processed at the PDC Emulator for a domain, to ensure such changes do
not prevent a user logging on as a result of multi-master replication delays, such as across Active Directory
sites.
multi-master directory concept
http://technet.microsoft.com/en-us/library/cc773108(v=ws.10).aspx
QUESTION 58
You perform a Server Core Installation of window Server 2012 R2 on server named Server1. You need to add
a graphical user interface (GUI) to server1.
Which tool should you use?
A. the Add-WindowsFeature cmdlet

B. the Install-Module cmdlet


C. the setup.exe command
D. the Add-WindowsPackage cmdlet
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. The Add-WindowsFeature cmdlet allows you to install specified roles, role services, and features B. Not a
valid cmdlet
D. Adds a single .cab or .msu file to a Windows image.
Add-WindowsFeature - Allows you to install specified roles, role services, and features

http://technet.microsoft.com/en-us/library/ee662309.aspx http://technet.microsoft.com/en-us/library/
hh852164.aspx
QUESTION 59
A network technician installs Windows Server 2012 R2 Standard on a server named Server1. A corporate
policy states that all servers must run Windows Server 2012 R2 Enterprise. You need to ensure that Server1
complies with the corporate policy. You want to achieve this goal by using the minimum amount of
administrative effort.
What should you perform?
A.
B.
C.
D.

a clean installation of Windows Server 2012 R2


an upgrade installation of Windows Server 2012 R2
online servicing by using Dism
offline servicing by using Dism

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Not least effort
B. Not least effort
C. dism /online /set-edition

D. offline would be less ideal and more workex: DISM /online /Set- Edition:ServerEnterprise/
ProductKey:489J6-VHDMP-X63PK-3K798-CPX3YWindows Server 2008 R2/2012 contains a command-line
utility called DISM (Deployment Image Servicing andManagement tool). This tool has many features, but one
of those features is the ability to upgrade the edition ofWindows in use. Note that this process is for upgrades
only and is irreversible. You cannot set a Windowsimage to a lower edition. The lowest edition will not appear
when you run the /Get- TargetEditions option.
If the server is running an evaluation version of Windows Server 2012 R2 Standard or Windows Server 2012
R2 Datacenter, you can convert it to a retail version as follows:
If the server is a domain controller, you cannot convert it to a retail version. In this case, install an
additionaldomain controller on a server that runs a retail version and remove AD DS from the domain controller
thatruns on the evaluation version. From an elevated command prompt, determine the current edition name
with the command DISM /online /Get-CurrentEdition. Make note of the edition ID, an abbreviated form of the
edition name. Then run DISM /online /Set- Edition:<edition ID> /ProductKey:XXXXXXXXXX-XXXXX-XXXXXXXXXX/AcceptEula,providing the edition ID and a retail product key.
The server will restart twice.
http://technet.microsoft.com/en-us/library/jj574204.aspx http://technet.microsoft.com/en-us/library/dd744380%
28v=ws.10%29.aspx http://blogs.technet.com/b/server_core/archive/2009/10/14/upgrading-windowsserver2008-r2- without-media.aspx
http://communities.vmware.com/people/vmroyale/blog/2012/05/30/howto-upgradingwindows- edition-with-dism
QUESTION 60
You have a domain controller named Server1 that runs Windows Server 2012 R2 and has the DNS Server
server role installed. Server1 hosts a DNS zone named contoso.com and a GlobalNames zone.
You discover that the root hints were removed from Server1.
You need to view the default root hints of Server1.
What should you do?
A.
B.
C.
D.

From Event Viewer, open the DNS Manager log.


From Notepad, open the Cache.dns file.
From Windows Powershell, run Get-DNSServerDiagnostics.
From nslookup, run root server1.contoso.com

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Allows you to troubleshoot DNS issues
B. DNS Server service implements root hints using a file, Cache.dns, stored in the systemroot\System32
\Dnsfolder on the server
C. Gets DNS event logging details
QUESTION 61
Your company has a main office and two branch offices. The offices connect to each other by using a WAN
link. In the main office, you have a server named Server1 that runs Windows Server 2012 R2. Server1 is
configured to use an IPv4 address only. You need to assign an IPv6 address to Server1. The IP address must
be private and routable.
Which IPv6 address should you assign to Server1?
A.
B.
C.
D.

fe80:ab32:145c::32cc:401b
ff00:3fff:65df:145c:dca8::82a4
2001:ab32:145c::32cc:401b
fd00:ab32:14:ad88:ac:58:abc2:4

Correct Answer: D

Section: (none)
Explanation
Explanation/Reference:
Explanation:
pg 266 Chapter 6 : Installing and Configuring Windows Server 2012 R2 Unique local addresses Unique local
addresses are IPv6 addresses that are private to an organization in the same way that private addresses-such as 10.x.x.x, 192.168.x.x, or 172.16.0.0 172.31.255.255--can be used on an IPv4 network.
Unique local addresses, therefore, are not routable on the IPv6 Internet in the same way that an address like
10.20.100.55 is not routable on the IPv4 Internet. A unique local address is always structured as follows:
The first 8 bits are always 11111101 in binary format. This means that a unique local address always begins
with FD and has a prefix identifier of FD00::/8.

QUESTION 62
Your network contains an Active Directory domain named contoso.com. All client computers run Windows 8.
You deploy a server named Server1 that runs Windows Server 2012 R2. You install a new client-server
application named App1 on Server1 and on the client computers. The client computers must use TCP port
6444 to connect to App1 on Server1. Server1 publishes the information of App1 to an intranet server named
Server2 by using TCP port 3080. You need to ensure that all of the client computers can connect to App1. The
solution must ensure that the application can connect to Server2. Which Windows Firewall rule should you
create on Server1?
A.
B.
C.
D.

an inbound rule to allow a connection to TCP port 3080


an outbound rule to allow a connection to TCP port 3080
an outbound rule to allow a connection to TCP port 6444
an inbound rule to allow a connection to TCP port 6444

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Server2 needs inbound on 3080
B. All ports outbound allowed by default
D. Server1 gets request from Client PC's it needs a inbound rule for 6444 By default, Windows Firewall with
Advanced Security blocks all unsolicited inbound networktraffic, and allows all outbound network traffic. For
unsolicited inbound network traffic to reach your computer, you must create an allow rule to permit that type of
network traffic. If a network program cannot get access, verify that in the Windows Firewall with Advanced
Security snap-in there is an active allow rule for the current profile. To verify that there is an active allow rule,
double-click Monitoring and then click Firewall.
If there is no active allow rule for the program, go to the Inbound Rules node and create a new rule for that
program. Create either a program rule, or a service rule, or search for a group that applies to the feature and
make sure all the rules in the group are enabled. To permit the traffic, you must create a rule for the program
that needs to listen for that traffic. If you know the TCP or UDP port numbers required by the program, you can
additionally restrict the rule to only those ports, reducing the vulnerability of opening up all ports for the
program. http://social.technet.microsoft.com/wiki/contents/articles/13894.troubleshooting-windows-firewallwith-advanced-security-in-windows-server-2012.aspx
QUESTION 63
Your network contains an Active Directory domain named contoso.com. All user accounts in the sales
department reside in an organizational unit (OU) named OU1. You have a Group Policy object (GPO) named
GPO1. GPO1 is used to deploy a logon script to all of the users in the sales department.
You discover that the logon script does not run when the sales users log on to their computers. You open
Group Policy Management as shown in the exhibit. You need to ensure that the logon script in GPO1 is
applied to the sales users.
What should you do?

A.
B.
C.
D.

Enforce GPO1.
Modify the link order of GPO1.
Modify the Delegation settings of GPO1.
Enable the link of GPO1.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
D. GPO1 needs to be linked to OU1

http://technet.microsoft.com/en-us/library/cc732979.aspx http://technet.microsoft.com/en-us/library/cc776004%
28v=ws.10%29.aspx#BKMK_icons_link
QUESTION 64
Your network contains an Active Directory domain named contoso.com.
All servers run Windows Server 2012 R2.
The domain contains a server named Server1.
You install the Windows PowerShell Web Access gateway on Server1. You need to provide administrators
with the ability to manage the servers in the domain by using the Windows PowerShell Web Access gateway.
Which two cmdlets should you run on Server1? (Each correct answer presents part of the solution. Choose
two.)
A.
B.
C.
D.
E.

Set-WSManQuickConfig
Set-WSManInstance
Add-PswaAuthorizationRule
Set-BCAuthentication
Install-PswaWebApplication

Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Configures the local computer for remote management.
B. Modifies the management information that is related to a resource. C. Adds a new authorization rule to the
Windows PowerShell Web Access authorization rule set. D. Specifies the BranchCache computer
authentication mode. E. Configures the Windows PowerShell Web Access web Application in IIS. http://
technet.microsoft.com/en-us/library/hh849867.aspx http://technet.microsoft.com/en-us/library/hh849875.aspx
http://technet.microsoft.com/en-us/library/jj592890(v=wps.620).aspx http://technet.microsoft.com/en-us/library/
hh848404(v=wps.620).aspx http://technet.microsoft.com/en-us/library/jj592894(v=wps.620).aspx
QUESTION 65
You have a server named Server 1 that runs Windows Server 2012 R2. Server 1 has the Hyper-V server role
installed.
You have fixed-size VHD named Files.vhd.
You need to make the contents in Files.vhd available to several virtual machines. The solution must meet the
following requirements:
- Ensure that if the contents are changed on any virtual machine, the changes are not reflected on the other
virtual machines.
- Minimize the amount of disk space used.
What should you do?
A.
B.
C.
D.

Create a fixed-size VHDX. Transfer the information from Files.vhd to the new VHDX file.
Convert Files.vhd to a dynamically expanding VHD?
Create a dynamically expanding VHDX. Transfer the information from Files.vhd to the new VHDX file.
Create differencing VHDs that use Files.vhd as the parent disk.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. A conversion would be needed from VHD to VHDX. Not available to multiple VM's B. Single VHD not
available to multiple VM's. Changes wouldn't be reflected C. A conversion would be needed from VHD to
VHDX. Not available to multiple VM's D. Child disk for multiple VM's with Files.vhd as parent A differencing
disk is associated with another virtual hard disk that you select when you create the differencing disk. This
means that the disk to which you want to associate the differencing disk must exist first. This virtual hard disk
is called the "parent" disk and the differencing disk is the "child" disk.
The parent disk can be any type of virtual hard disk.
The differencing disk stores all changes that would otherwise be made to the parent disk if the differencing
disk was not being used. The differencing disk provides an ongoing way to save changes without altering the
parent disk.
You can use the differencing disk to store changes indefinitely, as long as there is enough space on the
physical disk where the differencing disk is stored. The differencing disk expands dynamically as data is
written to it and can grow as large as the maximum size allocated for the parent disk when the parent disk was
created.
http://technet.microsoft.com/en-us/library/cc720381(v=ws.10).aspx
QUESTION 66
Your network contains an Active Directory domain named adatum.com. The domain contains several thousand

member servers that run Windows Server 2012 R2. All of the computer accounts for the member servers are
in an organizational unit (OU) named ServersAccounts.
Servers are restarted only occasionally.
You need to identify which servers were restarted during the last two days.
What should you do?
A.
B.
C.
D.

Run dsquery computer and specify the -stalepwd parameter


Run dsquery server and specify the -o parameter.
Run Get-ADComputer and specify the lastlogon property.
Run Get-ADComputer and specify the SearchScope parameter

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. dsquery computer -stalepwdnumber_of_days - Searches for all computers that have not changed
theirpassword for the specified number_of_days.
B. dsquery server -o {dn | rdn | samid} - Specifies the format in which the list of entries found by the search
willbe displayed: dn distinguished name of each entry, default; rdn relative distinguished name of each entry;
samid SAM account name of each entry computer group server user; upn user principal name of each
entryuser
C. Gets one or more Active Directory computers lastLogondate should be used D. SearchScope specifies the
scope of an Active Directory search. Possible values for this parameter are:
Base or 0; OneLevel or 1; Subtree or 2 - A Base query searches only the current path or object. A One Level
query searches the immediate children of that path or object. A Subtree query searches the current path
orobject and all children of that path or object.

http://technet.microsoft.com/en-us/library/ee617192.aspx http://technet.microsoft.com/en-us/library/cc732952
(v=ws.10).aspx
QUESTION 67
Your network contains three servers that run Windows Server 2012 R2. The servers are configured as shown
in the following table (click Exhibit). Server3 is configured to obtain an IP address automatically.
You need to ensure that Server3 only receives an IP address from Server1.
The IP address must always be the same.
Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.)

A.
B.
C.
D.
E.

Create an exclusion on Server1.


Create a filter on Server1.
Create a reservation on Server2
Create a reservation on Server1
Create a filter on Server2.

Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Exclude range of IP's for lease
B. Wrong Server
C. Wrong Sever
D. For clients that require a constant IP address, you can either manually configure a static IP address,or
assign a reservation on the DHCP server
E. DHCP Deny Filter at Server2 to exclude MAC address of Server3 MAC address filterEnable and define an
explicit allow list. The DHCP server provides DHCP services only to clients whose MACaddresses are in the
allow list. Any client that previously received IP addresses is denied address renewal if its MAC address isn't
onthe allow list. Enable and define an explicit deny list. The DHCP server denies DHCP services only to clients
whose MACaddresses are in the deny list.
Any client that previously received IP addresses is denied address renewal if its MAC address is on thedeny
list.
Enable and define an allow list and a block list.
The block list has precedence over the allow list. This means that the DHCP server provides DHCPservices
only to clients whose MAC addresses are in the allow list, provided that no corresponding matchesare in the
deny list.
If a MAC address has been denied, the address is always blocked even if the address is on the allowlist.
http://technet.microsoft.com/en-us/library/cc754537(v=ws.10).aspx http://technet.microsoft.com/en-us/
magazine/ff521761.aspx http://technet.microsoft.com/en-us/library/cc779507(v=ws.10).aspx
QUESTION 68
Your network contains an Active Directory domain named contoso.com. The domain contains a domain
controller named DC1 that runs Windows Server 2012 R2 and a client computer named Computer1 that runs
Windows 8. DC1 is configured as a DHCP server as shown in the exhibit. (Click the Exhibit button.) Computer1
is configured to obtain an IP address automatically. You need to ensure that Computer1 can receive an IP
address from DC1.
What should you do?

A.
B.
C.
D.

Disable the Allow filters.


Disable the Deny filters
Activate Scope [10.1.1.0] Contoso.com.
Authorize dc1.contoso.com.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Red down arrow indicates a unauthorized DHCP server A DHCP server that is a domain controller or a
member of an Active Directory domain queries Active Directoryfor the list of authorized servers (identified by IP
address). If its own IP address is not in the list of authorized DHCP servers, the DHCP Server service does not
completeits startup sequence and automatically shuts down. http://technet.microsoft.com/en-us/library/
cc754792.aspx http://technet.microsoft.com/en-us/library/ee941131(v=ws.10).aspx http://
technet.microsoft.com/en-us/library/gg722802(v=ws.10).aspx http://pc-addicts.com/server-2012-dhcp-serverrole/
QUESTION 69
Your network contains an Active Directory domain named contoso.com. The domain contains a domain
controller named Server1 that has the DNS Server server role installed. Server1 hosts a primary zone for
contoso.com. The domain contains a member server named Server2 that is configured to use Server1 as its
primary DNS server. From Server2, you run nslookup.exe as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that when you run Nslookup, the correct name of the default server is displayed.
What should you do?

A.
B.
C.
D.

From Advanced TCP/IP Settings on Server1, add contoso.com to the DNS suffix list
On Server1, modify the Security settings of the contoso.com zone
On Server1, create a reverse lookup zone.
From Advanced TCP/IP Settings on Server2, add contoso.com to the DNS suffix list

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
C. Make sure that a reverse lookup zone that is authoritative for the PTR resource record exists. For more
information about adding a reverse lookup zone, see "Adding a Reverse Lookup Zone" http://
technet.microsoft.com/en-us/library/cc961417.aspx
QUESTION 70
Your network contains an Active Directory domain named contoso.com. The domain contains a domain
controller named DC1 that hosts the primary DNS zone for contoso.com. All client computers are configured to
use DC1 as the primary DNS server. You need to configure DC1 to resolve any DNS requests that are not for
the contoso.com zone by querying the DNS server of your Internet Service Provider (ISP).
What should you configure?
A.
B.
C.
D.

Name server (NS) records


Condition& forwarders
Forwarders
Naming Authority Pointer (NAPTR) DNS resource records (RR)

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Specifies a name server for the domain, which allows DNS lookups within various zones. Each primary
andsecondary name server should be declared through this record. B. http://windowsitpro.com/networking/qwhats-conditional-dns-forwarding C. manage the Domain Name System (DNS) traffic between your network
and the Internet D.Configure forwarders to send DNS queries directly to your ISP's DNS server or other DNS
servers. Most of the time, when you configure forwarders, DNS performance and efficiency increases, but
thisconfiguration can also introduce a point of failure if the forwarding DNS server is experiencing problems.
A forwarder is a Domain Name System (DNS) server on a network used to forward DNS queries for

externalDNS names to DNS servers outside of that network. A DNS server on a network is designated as a
forwarder by having the other DNS servers in the networkforward the queries they
cannot resolve locally to that DNS server. By using a forwarder, you can manage name resolution for names
outside of your network, such as names onthe Internet, and improve the efficiency of name resolution for the
computers in your network.
http://social.technet.microsoft.com/Forums/en-US/winserverNIS/thread/2f35cae2-341c4bfe-9dac724ddace6d51/
http://technet.microsoft.com/en-us/library/cc722542.aspx http://technet.microsoft.com/en-us/library/
cc754931.aspx
QUESTION 71
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows
Server 2012 R2. The domain contains a server named Server1 that runs Windows Server 2012 R2.
You need to ensure that when users log on to Server1, their user account is added automatically to a local
group named Group1 during the log on process.
Which Group Policy settings should you modify?
A.
B.
C.
D.

Restricted Groups
Security Options
User Rights Assignment
Preferences

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. If a Restricted Groups policy is defined and Group Policy is refreshed, any current member not on the
Restricted Groups policy members list is removed
B. Security settings incorporated into policies are rules that administrators configure on a computer or multiple
computers for the purpose of protecting resources on a computer C. User Rights Assignment policies
determines which users or groups have logon rights or privileges on the computer
D. With Preferences, local and domain accounts can be added to a local group without affecting the existing
members of the group
http://technet.microsoft.com/en-us/library/cc785631(v=ws.10).aspx http://www.grouppolicy.biz/2010/01/how-touse-group-policy-preferences-to-secure- localadministrator-groups/
http://technet.microsoft.com/en-us/library/cc780182(v=ws.10).aspx http://technet.microsoft.com/en-us/library/
hh831424.aspx
QUESTION 72
Your network contains an Active Directory domain named contoso.com. You need to prevent users from
installing a Windows Store app named App1.
What should you create?
A.
B.
C.
D.

An application control policy executable rule


An application control policy packaged app rule
A software restriction policy certificate rule
An application control policy Windows Installer rule

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:

Windows 8 is coming REALLY SOON and of course one of the big new things to computer with that is the
newPackaged Apps that run in the start screen. However these apps are very different and do not install
liketraditional apps to a path or have a true "executable" file to launch the program. Ofcourse enterprises need
a way to control these packaged apps and therefore Microsoft has
added a newfeature Packaged Apps option to the App1ocker feature.
A. For .exe or .com
B. A publisher rule for a Packaged app is based on publisher, name and version C. You can create a certificate
rule that identifies software and then allows or does not allow the software torun, depending on the security
level.
D. For .msi or .msp
Packaged apps (also known as Windows 8 apps) are new to Windows Server 2012 R2 and Windows 8. They
are based on the new app model that ensures that all the files within an app package share the sameidentity.
Therefore, it is possible to control the entire Application using a single App1ocker rule as opposed to the
nonpackagedapps where each file within the app could have a unique identity. Windows does not support
unsigned packaged apps which implies all packaged apps must be signed. App1ocker supports only publisher
rules for Packaged apps. A publisher rule for a Packaged app is based on the following information:
Publisher of the package
Package name
Package version
Therefore, an App1ocker rule for a Packaged app controls both the installation as well as the running of
theapp. Otherwise, the publisher rules for Packaged apps are no different than the rest of the rule collections;
theysupport exceptions, can be increased or decreased in scope, and can be assigned to users and groups.
http://technet.microsoft.com/en-us/library/dd759068.aspx http://technet.microsoft.com/en-us/library/
hh994588.aspx http://www.grouppolicy.biz/2012/08/how-manage-published-a-k-a-metro-apps-in-windows8using- grouppolicy/
http://technet.microsoft.com/en-us/library/hh994597.aspx#BKMK_Cert_Rules Packaged Apps run in the start
screen.
However these apps are very different and do not install like traditional apps to a path or have a
true"executable" file to launch the program.
Enterprises need a way to control these packaged apps and therefore Microsoft has added a new
featurePackaged Apps option to the App1ocker feature.
QUESTION 73
Your company's security policy states that all of the servers deployed to a branch office must not have the
graphical user interface (GUI) installed. In a branch office, a support technician installs a server with a GUI
installation of Windows Server 2012 on a new server, and then configures the server as a DHCP server.
You need to ensure that the new server meets the security policy. You want to achieve this goal by using the
minimum amount of Administrative effort.
What should you do?
A.
B.
C.
D.

Reinstall Windows Server 2012 on the server.


From Windows PowerShell, run Uninstall-WindowsFeature Desktop-Experience.
From Windows PowerShell, run Uninstall-WindowsFeature PowerShell-ISE.
From Server Manager, uninstall the User Interfaces and Infrastructure feature.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Not least effort
B. Uninstalls desktop experience not the full GUI
C. Uninstalls the powershell ISE
D. Least effort and removes full GUI

http://www.howtogeek.com/111967/how-to-turn-the-gui-off-and-on-in-windows-server-2012/ http://
technet.microsoft.com/en-us/library/cc772567.aspx http://blogs.technet.com/b/server_core/archive/2012/05/09/
configuring-the-minimal- serverinterface.aspx
QUESTION 74
Your network contains an Active Directory domain named contoso.com. The domain contains 500 servers that
run Windows Server 2012 R2.
You have a written security policy that states the following:
- Only required ports must be open on the servers.
- All of the servers must have Windows Firewall enabled.
- Client computers used by Administrators must be allowed to access all of the ports on all of the servers.
- Client computers used by the Administrators must be authenticated before the client computers can access
the servers.
You have a client computer named Computer1 that runs Windows 8. You need to ensure that you can use
Computer1 to access all of the ports on all of the servers successfully. The solution must adhere to the security
policy. Which three actions should you perform? (Each correct answer presents part of the solution.
Choose three.)
A. On Computer1, create a connection security rule
B. On all of the servers, create an outbound rule and select the Allow the connection if it is secureoption.
C. On all of the servers, create an inbound rule and select the Allow the connection if it is secureoption.

D. On Computer1, create an inbound rule and select the Allow the connection if it is secureoption.
E. On Computer1, create an outbound rule and select the Allow the connection if it is secureoption
F. On all of the servers, create a connection security rule
Correct Answer: ACF
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc772017.aspx Unlike firewall rules, which operate unilaterally,
connection security rules require that both communicating computers have a policy with connection security
rules or another compatible IPsec policy.
http://technet.microsoft.com/en-us/library/cc753463.aspx Traffic that matches a firewall rule that uses the Allow
connection if it is secure setting bypasses Windows Firewall. The rule can filter the traffic by IP address, port,
or protocol. This method is supported on Windows Vista or Windows Server 2008.
QUESTION 75
Your network contains a file server named Server1 that runs Windows Server 2012 R2. All client computers
run Windows 8. Server1 contains a folder named Folder1. Folder1 contains the installation files for the
company's desktop applications.
A network technician shares Folder1 as Share 1.
You need to ensure that the share for Folder1 is not visible when users browse the network.
What should you do?
A.
B.
C.
D.

From the properties of Folder1, deny the List Folder Contents permission for the Everyone group.
From the properties of Folder1, remove Share1, and then share Folder1 as Share1$.
From the properties of Folder1, configure the hidden attribute.
From the properties of Share1, configure access-based enumeration

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Will deny everyone list of folder content
B. Remove share and re-add using $ for Hidden/Administrative share C. This will hide the physical folder
D. lists only the files and folders to which they have access when browsing content on the file server A hidden
share is identified by a dollar sign ($) at the end of the share name Hidden shares are not listed when you look
through the shares on a computer or use the "net view" command
Why Use Hidden Shares?
Using hidden shares on your network is useful if you do not want a shared folder or drive on the network to
beeasily accessible. Hidden shares can add another layer of protection for shared files against
unauthorizedpeople connecting to your network. Using hidden shares helps eliminate the chance for people to
guess yourpassword (or be logged into an authorized Windows account) and then receive access to the
shared resource.

http://support.microsoft.com/kb/314984
http://technet.microsoft.com/en-us/library/cc784710(v=ws.10).aspx
QUESTION 76
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1 that runs Windows Server 2012 R2 and a server named Server2 that runs
Windows Server 2008 R2 Service Pack 1 (SP1). Both servers are member servers. On Server2, you install all
of the software required to ensure that Server2 can be managed remotely from Server Manager.
You need to ensure that you can manage Server2 from Server1 by using Server Manager. Which two tasks
should you perform on Server2? (Each correct answer presents part of the solution. Choose two.)
A.
B.
C.
D.
E.

Run the systempropertiesremote.execommand


Run the Enable-PsRemotingcmdlet.
Run the Enable-PsSessionConfigurationcmdlet
Run the Confiqure-SMRemoting.ps1script
Run the Set-ExecutionPolicycmdlet.

Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
To configure Server Manager remote management by using Windows PowerShell On the computer that you
want to manage remotely, open a Windows PowerShell session with elevated user rights. To do this, click
Start, click All Programs, click Accessories, click Windows PowerShell, right-click the Windows PowerShell
shortcut, and then click Run as administrator. In the Windows PowerShell session, type the following, and then
press Enter.
Set-ExecutionPolicy -ExecutionPolicyRemoteSigned
Type the following, and then press Enter to enable all required firewall rule exceptions.

Configure-SMRemoting.ps1 -force -enable


http://technet.microsoft.com/en-us/library/dd759202.aspx A) Run the systempropertiesremote.exe command
B) Enable-PSRemotingcmdlet configures the computer to receive Windows PowerShell remote commandsthat
are sent by using the WS-Management technology. C) Enable-PSSessionConfigurationcmdlet enables
registered session configurations that have been disabled.
D) Configure-SMRemoting.ps1 -force -enable
E) Set-ExecutionPolicy -ExecutionPolicyRemoteSigned
To configure Server Manager remote management by using Windows PowerShell On the computer that you
want to manage remotely, open a Windows PowerShell session with elevated userrights, type the following:

To configure Server Manager remote management by using Windows PowerShell. On the computer that
youwant to manage remotely, open a Windows PowerShell session with elevated user rights. To do this, click
Start, click All Programs, click Accessories, click Windows PowerShell, right-click the WindowsPowerShell
shortcut, and then click Run as administrator. In the Windows PowerShell session, type thefollowing, and then
press Enter. Set-ExecutionPolicy - ExecutionPolicyRemoteSigned Type the following, and then press Enter to
enable allrequired firewall rule exceptions.
Configure-SMRemoting.ps1 -force -enable
http://technet.microsoft.com/en-us/library/dd759202.aspx
QUESTION 77
Your network contains an Active Directory domain named contoso.com. The domain contains two member
servers named Server1 and Server2 that run Windows Server 2012 R2.
You log on to Server1.
You need to retrieve the IP configurations of Server2.
Which command should you run from Server1?
A.
B.
C.
D.

winrs -r:server2 ipconfig


winrm get server2
dsquery *-scope base-attr ip, server2
ipconfig > server2.ip

Correct Answer: A
Section: (none)

Explanation
Explanation/Reference:
Explanation:
A. Windows Remote Management allows you to manage and execute programs remotely B. winrm is the
server side services for remote mgmt
C. dsquery * finds any objects in the directory according to criteria using a LDAP query. D. Would output
server1 ipconfig info to server2.ip file

http://technet.microsoft.com/en-us/library/dd349801(v=ws.10).aspx
QUESTION 78
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers on the L2P.com network have Windows Server 2008 R2 installed. Some of L2P.com's workstations
have Windows 7 installed, while the rest have Windows 8 installed. After installing a new Windows Server
2012 computer in the L2P.com domain, you configure it to run the File and Storage Services server role. You
are instructed to create a shared folder on the new server, and configure the use of Previous Versions for
restoring files located in the shared folder.
Which of the following actions should you take?
A.
B.
C.
D.

You should consider configuring the Shadow Copies settings on the new server.
You should consider configuring the Snapshot settings on the new server.
You should consider configuring the Background Copy settings on the new server.
You should consider configuring the Permission settings on the new server.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
What are previous versions?
Previous versions are either backup copies (copies of files and folders that you back up by using the Back Up
Files wizard, or shadow copies) copies of files and folders that Windows automatically saves as part of a
restore point. (Shadow copies can be copies of files on your computer or shared files on acomputer on a
network.) You can use previous versions of files to restore files that you accidentally modified or deleted, or
that were damaged. Depending on the type of file or folder, you can open, save to a different location, or
restore a previous version. ATT: ( nothing to do with question but cool to know ) File Server Volume Copy
Shadow Service
(VSS) Agent Service Enables consistency of application snaphots (shadow copies). With previous versions of
Windows Server, VSS only supported shadow copies of data on the local server. With WS2012, Microsoft has
added VSS for SMB File Shares which extends shadow copy support for network volumes.Administrators
install the FS VSS Agent on the file server where the application data is located. They then install the VSS
provider in the server where the application is located. The provider talks to the agent using the new File
Server Remote VSS protocol in order to manage the shadow copies of the data.
http://windows.microsoft.com/en-gb/windows-vista/previous-versions-of-files-frequently-asked- questions
QUESTION 79
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role
installed. The disks on Server1 are configured as shown in the exhibit. (Click the Exhibit button.)
You create a virtual machine on Server1.
You need to ensure that you can configure a pass-through disk for the virtual machine.
What should you do?

A.
B.
C.
D.

Delete partition E.
Convert Disk 1 to a GPT disk
Convert Disk 1 to a dynamic disk.
Take Disk 1 offline.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Pass-Through Disk must be offline
Pass-through Disk Configuration
Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring
thevolume be configured. The storage can either be a physical disk internal to the Hyper- V server or it can be
aStorage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest
hasexclusive access to the storage, it must be placed in an Offline state from the Hyper-V serverperspective
http://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks-inhyper- v.aspx
http://technet.microsoft.com/pt-pt/library/ff404147%28v=ws.10%29.aspx
QUESTION 80
Your network contains an Active Directory domain named contoso.com. The domain contains two servers
named Server2 runs Windows Server 2012 R2. You create a security template named Template 1 by using the
Security Templates snap-in.
You need to apply template 1 to Server 2.
Which tool should you use?
A.
B.
C.
D.

Security Templates.
Computer Management.
Security Configuration and Analysis.
System Configuration.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Security templates are inactive until imported into a Group Policy object or the Security Configurationand
Analysis.

http://technet.microsoft.com/en-us/library/jj730960.aspx http://windows.microsoft.com/en-us/windows-vista/
using-system-configuration
QUESTION 81
Your network contains an Active Directory domain named contoso.com. The domain contains a domain
controller named DCS. DC5 has a Server Core Installation of Windows Server 2012 R2.
You need to uninstall Active Directory from DC5 manually.
Which tool should you use?
A.
B.
C.
D.

The ntdsutil.exe command


The dcpromo.exe command
The Remove-WindowsFeaturecmdlet
The Remove-ADComputercmdlet

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Explanation/Reference:
http://technet.microsoft.com/en-us/library/hh472163.aspx#BKMK_RemoveSM http://technet.microsoft.com/enus/library/cc732257.aspx#BKMK_powershell
QUESTION 82
You have a server named Server 2 that runs Windows Server 2012 R2. Server 2 has the Hyper-V server role
installed.
The disks on Server2 are configured as shown in the exhibit. (Click the Exhibit button).
You create a virtual machine on Server2 named VM1.
You need to ensure that you can configure a pass-through disk for VM1. What should you do?

A.
B.
C.
D.

Convert Disk 1 to a MBR disk.


Convert Disk 1 to a basic disk.
Take Disk 1 offline.
Create a partition on Disk 1.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Pass-through Disk Configuration
Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring the
volume be configured. The storage can either be a physical disk internal to the Hyper-V server or it can be a
Storage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest has
exclusive access to the storage, it must be placed in an Offline state from the Hyper-V server perspective
http://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks-in-hyper- v.aspx
QUESTION 83

You have a file server named Server1 that runs Windows Server 2012 R2.
Server1 has following hardware configurations:
- 16GB of RAM
- A single quad-core CPU
- Three network teams that have two network adapters each
You add additional CPUs and RAM to Server 1.
You repurpose Server1 as a virtualization host.
You install the Hyper-V server role on Server1. You need to create four external virtual switches in Hyper-V.
Which cmdlet should you run first?
A.
B.
C.
D.

Set-NetAdapter.
Add-Net1.bfoTeamNic
Add-VMNetworkAdapter
Remove-NetLbfoTeam

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Sets adapter properties
B. Add new interface to NIC Team
C. Adds vadapter to vm
D. Removed NIC from host
You need 4 virtual switches but currently only have 3 teams available.
You would need to break a team first.
http://technet.microsoft.com/en-us/library/jj130875(v=wps.620).aspx http://technet.microsoft.com/en-us/library/
jj130850(v=wps.620).aspx http://technet.microsoft.com/en-us/library/hh848564(v=wps.620).aspx http://
technet.microsoft.com/en-us/library/jj130848(v=wps.620).aspx http://technet.microsoft.com/en-us/library/
jj130848.aspx
QUESTION 84
Your network contains an Active Directory domain named contoso.com. The domain contains two servers
named Server1 and Server2 that run Windows Server 2012 R2. You create a security template named
Template1 by using the Security Templates snap-in.
You need to apply Template1 to Server2.
Which tool should you use?
A.
B.
C.
D.

Authorization Manager
Local Security Policy
Certificate Templates
System Configuration

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A security policy is a combination of security settings that affect the security on a computer. You can use your
local security policy to edit account policies and local policies on your local computer.
QUESTION 85
Your network contains an Active Directory domain named adatum.com. The domain contains a member server

named Server1 and a domain controller named DC2. All servers run Windows Server 2012 R2. On DC2, you
open Server Manager and you add Server1 as another server to manage. From Server Manager on DC2, you
right-click Server1 as shown in the exhibit. You need to ensure that when you right-click Server1, you see the
option to run the DHCP console.
What should you do?

A.
B.
C.
D.

On Server1, install the Feature Administration Tools.


In the domain, add DC1 to the DHCP Administrators group.
On DC2 and Server1, run winrm quickconfig.
On DC2, install the Role Administration Tools.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/hh831825.aspx

QUESTION 86
Your network contains an Active Directory domain named contoso.com.
The domain contains a server named Server 2012.
You create a group Manged Service Account named gservice1. You need to configure a service named
Service1 to run as the gservice1 account.
How should you configure Service1?
A.
B.
C.
D.

From a command prompt, run sc.exe and specify the config parameter.
From Windows PowerShell,run Set-Service and specify the -PassThrough parameter
From Windows PowerShell,run Set-Service and specify the -StartupType parameter
From Services Console configure the General settings

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 87
Your network contains an Active Directory domain named contoso.com. An organizational unit (OU) named
OU1 contains user accounts and computer accounts. A Group Policy object (GPO) named GP1 is linked to the
domain. GP1 contains Computer Configuration settings and User Configuration settings.
You need to prevent the User Configuration settings in GP1 from being applied to users. The solution must
ensure that the Computer Configuration settings in GP1 are applied to all client computers.
What should you configure?
A.
B.
C.
D.

the Group Policy loopback processing mode


the Block Inheritance feature
the Enforced setting
the GPO Status

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Group Policy loopback with replace option needs to be used B. Blocking inheritance prevents Group Policy
objects (GPOs) that are linked to higher sites, domains, ororganizational units from being automatically
inherited by the child-level C. Enforced prevent blocking at lower level
D. The GPO Status. This indicates whether either the user configuration or computer configuration of the
GPOis enabled or disabled.
You can use the Group Policy loopback feature to Apply Group Policy Objects (GPOs) that depend only
onwhich computer the user logs on to.
User Group Policy loopback processing can be enabled in one of two modes: merge or replace. In
mergemode, both GPOs Applying to the user account and GPOs Applying to the computer account are
processedwhen a user logs in. GPOs that Apply to the computer account are processed second and therefore
takeprecedence - if a setting is defined in both the GPO(s) Applying to the user account, and the GPO(s)
Applyingto the computer account, the setting in the GPO(s) Applying to the computer account will be enforced.
With thereplace mode, GPOs Applying to the user account are not processed only the GPOs Applying to
thecomputer account are Applied. Loopback can be set to Not Configured, Enabled, or Disabled. In the
Enabled state, loopback can be set toMerge or Replace. In either case the user only receives user-related
policy settings. Loopback with Replace- -In the case of Loopback with Replace, the GPO list for the user is
replaced in itsentirety by the GPO list that is already obtained for the computer at computer startup (during
step 2 in GroupPolicy processing and precedence). The User Configuration settings from this list are Applied
to the user. Loopback with Merge--In the case of Loopback with Merge, the Group Policy object list is a

concatenation.
The default list of GPOs for the user object is obtained, as normal, but then the list of GPOs for the computer
(obtained during computer startup) is appended to this list. Because the computer's GPOs are processed
afterthe user's GPOs, they have precedence if any of the settings conflict. This is a COMPUTER setting, which
is found under Computer Configuration | Administrative Templates | System | Group Policy | User Group Policy
Loopback Processing Mode You want to create a new OU in AD that is dedicated to computer accounts that
will have loopbackprocessing enabled. Create a new GPO in your new OU to enable User Group Policy
Loopback Processing and set theappropriate mode (merge / replace).
You will define the user settings you want to Apply to the loopback-enabled PCs via GPOs in this same
newOU.
You can define these settings either in the same GPO where you enabled the User Group PolicyLoopback
Processing setting, or you create another new GPO in the same OU for your user settings.
Remember that when using the REPLACE mode, none of your other user GPOs will be Applied whena user
logs in to a machine that has loopback processing enabled. ONLY the user settings that aredefined in the
GPOs that Apply to that machine will be Applied. http://msmvps.com/blogs/cgross/archive/2009/10/12/grouppolicy-loopbackprocessing.aspx http://technet.microsoft.com/en-us/library/cc782810(v=ws.10).aspx http://
technet.microsoft.com/en-us/library/cc731076.aspx http://technet.microsoft.com/en-us/library/cc753909.aspx
http://technet.microsoft.com/en-us/library/cc778238%28v=ws.10%29.aspx http://technet.microsoft.com/en-us/
magazine/dd673616.aspx
QUESTION 88
Your network contains two Hyper-V hosts named Host1 and Host2. Host1 contains a virtual machine named
VM1.
Host2 contains a virtual machine named VM2. VM1 and VM2 run Windows Server 2012 R2. You install the
Network Load Balancing feature on VM1 and VM2. You need to ensure that the virtual machines are
configured to support Network Load Balancing (NLB).
Which virtual machine settings should you configure on VM1 and VM2?
A.
B.
C.
D.

Router guard
DHCP guard
Port mirroring
MAC address

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
In Hyper-V, the VM host prevents dynamic MAC address updates as an extra layer of security in
thedatacenter. This is because the VM may have full administrator rights, yet it may be untrusted in
thedatacenter, for example when the VM hosting is provided by an independent hosting company. In this
scenario,we need to make sure that one VM cannot cause a DOS or information disclosure attack against
another VM. If a VM is able to spoof its MAC address, then it can spoof the MAC addresses of other VMs and
impactother VMs on that host. The physical switches have similar protections and it is up to the admin to
enable thatprotection or not. If you do not enable spoofing of MAC address prior to configuring NLB on the VM
you could potentially haveproblems with the NLB cluster.
When configuring NLB in unicast mode on Hyper-V with enable spoofing of MAC Address disabled you
maysee some of the following symptoms:
When initially configuring NLB you will lose network connectivity on the network adaptor NLB was
configuredon.
There will be an NLB error event in the Windows Event Log stating that the network adaptor does
not supportdynamic MAC address updates.
After rebooting the server, NLB will appear to be bound to the network adapter, but the cluster VIP will nothave

been added to the network adaptor.


The cluster MAC address will still be the original MAC address associated with the network adaptor prior
toconfiguring NLB. Use CMD>ipconfig /all to view the MAC address.
It should start with "02-BF-***"
If you ignore all previous symptoms and manually add the VIP you could get an IP conflict if there are
othernodes in the cluster that have the same VIP.
With that said, to allow VM guests to run NLB you need to set the VM property for "Enable spoofing of
MACAddress".
To enable spoofing of MAC Addresses open the Hyper-V management console. Make sure the VM is
stoppedopen the properties of the VM. Select the Network Adaptor for the NLB VM and check the "Enable
spoofing ofMAC Address" and click OK. Then start the VM.
QUESTION 89
Your network contains a Windows Server 2012 R2 image named Server12.wim. Server12.wim contains the
images shown in the following table.

Server12.wim is located in C:\.


You need to enable the Windows Server Migration Tools feature in the Windows Server 2012 R2 Server
Datacenter image.
You want to achieve this goal by using the minimum amount of Administrative effort.
Which command should you run first?
A.
B.
C.
D.

dism.exe /mount-wim /wimfile:c:\Server12.wim /index:4 /mountdir:c:\mount


imagex.exe /capture c: c:\Server12.wim "windows server 2012server datacenter"
dism.exe /image: c:\Server12.wim /enable-feature /featurename: servermigration
imagex.exe /apply c:\Server12.wim 4 c:\

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Mounts the image before making any chnages
B. imagex /capture creates windows images .wim
C. You need to mount the image first
D. imagex /Apply Applies image to drive
The Deployment Image Servicing and Management (DISM) tool is a command-line tool that is used to
modifyWindows images.
You can use DISM to enable or disable Windows features directly from the commandprompt, or by Applying an
answer file to the image.
You can enable or disable Windows features offline on a WIM or VHD file, or online on a running operating
system.
You can also use the DISM image management command to list the image index numbers or to verify
thearchitecture for the image that you are mounting.ex:
Dism /Mount-Image /ImageFile:C:\test\images\install.wim /Name:"Base Windows Image" /MountDir:C:\test
\offline
By default, DISM is installed at C:\Program Files (x86)\Windows Kits\8.0\Assessment and

Deployment Kit\Deployment Tools\


http://technet.microsoft.com/en-us/library/hh824822.aspx http://technet.microsoft.com/en-us/library/
hh825258.aspx http://technet.microsoft.com/en-us/library/cc749447(v=ws.10).aspx http://
technet.microsoft.com/en-us/library/dd744382(v=ws.10).aspx
QUESTION 90
Your network contains an Active Directory domain named contoso.com.
The domain contains a server named Server1.
Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
On Server1, you create a virtual machine named VM1.
When you try to add a RemoteFX 3D Video Adapter to VM1, you discover that the option is unavailable as
shown in the following exhibit.

You need to add the RemoteFX 3D Video Adapter to VM1.


What should you do first?
A.
B.
C.
D.

On Server1, run the Enable-VMRemoteFxPhysicalVideoAdapter cmdlet.


On Server1, install the Media Foundation feature.
On Server1, run the Add-VMRemoteFx3dVideoAdapter cmdlet.
On Server1, install the Remote Desktop Virtualization Host (RD Virtualization Host) role service.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Enables one or more RemoteFX physical video adapters for use with RemoteFX-enabled virtual machines.
B.
C. Adds a RemoteFX video adapter in a virtual machine.
D. Role must be added for host first
TM is included as part of the Remote Desktop Virtualization Host role service, and it Microsoft?RemoteFX
enables the delivery of a full Windows user experience to a range of client devices including rich clients, thin
clients, and ultrathin clients. RemoteFX renders content by using graphics processing units (GPUs) that are
present on the server and then shared across multiple virtual desktops. RemoteFX renders a range of content
including DirectX and all types of multimedia, and it is optimized for LAN-based networks. The number of
monitors and their maximum resolution determines the amount of GPU memory on the server required by
RemoteFX. This consideration is important in determining the scale for how many virtual machines a Remote
Desktop Virtualization Host server can support.
http://technet.microsoft.com/en-us/library/hh848506(v=wps.620).aspx http://technet.microsoft.com/en-us/
library/hh848520(v=wps.620).aspx http://technet.microsoft.com/en-us/library/ff817586(v=ws.10).aspx
QUESTION 91
Your network contains an Active Directory domain named contoso.com. The network contains a domain
controller named DC1 that has the DNS Server server role installed.
DC1 has a standard primary DNS zone for contoso.com.
You need to ensure that only client computers in the contoso.com domain will be able to add their records to
the contoso.com zone.
What should you do first?
A.
B.
C.
D.

Modify the Security settings of Dc1


Modify the Security settings of the contoso.com zone.
Store the contoso.com zone in Active Directory
Sign the contoso.com zone.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
C. Only Authenticated users can create records when zone is stored in AD Secure dynamic updates allow an
administrator to control what computers update what names and preventunauthorized computers from
overwriting existing names in DNS. If you have an Active Directory infrastructure, you can only use Active
Directory - integrated zones on ActiveDirectory domain controllers. If you are using Active Directory integrated zones, you must decide whether or not to store Active Directory - integrated zones in the Application
directory partition. To configure computers to update DNS data more securely, store DNS zones in Active
Directory DomainServices (AD DS) and use the secure dynamic update feature. Secure dynamic update
restricts DNS zone updates to only those computers that are authenticated and joinedto the Active Directory
domain where the DNS server is located and to the specific security settings that aredefined in the access
control lists (ACLs) for the DNS zone. http://technet.microsoft.com/en-us/library/cc731204(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/cc755193.aspx http://technet.microsoft.com/en-us/library/cc786068%
28v=ws.10%29.aspx
QUESTION 92
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V
server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is
configured as shown in the following table.

You install a network monitoring application on VM2.


You need to ensure that all of the traffic sent to VM3 can be captured on VM2.
What should you configure?
A.
B.
C.
D.
E.
F.
G.
H.
I.
J.
K.

NUMA topology
Resource control
resource metering
virtual Machine Chimney
the VLAN ID
Processor Compatibility
the startup order
Automatic Start Action
Integration Services
Port mirroring
Single-root I/O virtualization

Correct Answer: J
Section: (none)
Explanation
Explanation/Reference:
Explanation:
J. With Hyper-V Virtual Switch port mirroring, you can select the switch ports that are monitored as well as the
switch port that receives copies of all the traffic

http://technet.microsoft.com/en-us/library/jj679878.aspx#bkmk_portmirror
QUESTION 93
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V
server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is
configured as shown in the following table.

You plan to schedule a complete backup of Server1 by using Windows Server Backup. You need to ensure
that the state of VM1 is saved before the backup starts.
What should you configure?
A.
B.
C.
D.
E.
F.
G.
H.
I.
J.
K.

NUMA topology
Resource control
resource metering
virtual Machine Chimney
the VLAN ID
Processor Compatibility
the startup order
Automatic Start Action
Integration Services
Port mirroring
Single-root I/O virtualization

Correct Answer: I
Section: (none)
Explanation
Explanation/Reference:
Explanation:
What is the Hyper-V Saved State?
Some Hyper-V virtual machines briefly go offline into a "Saved State" at the initial phase of a backup. While the
backup is running, they usually come back online after a couple of seconds. Background KnowledgeThe
decision to pull Hyper-V virtual machines offline into a Saved State is done solely within Hyper-VManagement
Services.
Backup software utilities have no way to force a live backup when Hyper-V determines it can't and shouldn't
bedone.There are many factors that are considered by Hyper-V when it decides whether to take a VM offline
or not,Hyper-V Live Backup Requirements:
To achieve zero downtime live backups of virtual machines, you need the following conditions met:
1. The VM guest needs to have Integration Services installed, enabled, and running (COM+ System
Application Service, Distributed Transaction Coordinator Service, and Volume Shadow Copy Service).
Alsoreview the VM settings in Hyper-V, the 'backup' option needs to be checked.
2. All disks involved need to be formatted with NTFS, including the disks within the VM.
3. The Volume Shadow Copy Service and related VSS services need to be enabled and running.
4. The shadow copy storage space for each drive must be available to Hyper-V VSS Writer and be located
atthe same volume. For instance, the storage space for drive C: needs to be on drive C:
itself, and so on. Usethe VSSADMIN command from the command line to check the settings. (Use:
vssadmin list shadowstorage /vssadmin resize shadowstorage)
5. Ensure the VMs are partitioned using 'basic disk' formatting. At the moment Hyper-V does not support
livebackup for VMs formatted using dynamic disk partitioning or GPT.

7. Ensure you have at least about 20% free space on each drive involved, such as the drive on the
host andthe VM's main system drive.
8. Ensure plenty of un-fragmented RAM is available on the host. If a machine is pulled into Saved State,
Hyper-V may not be able to bring the VM back online if it can't allocate a continuous block of RAM. Note that
theremay be sufficient total RAM available but not enough to place a single block. You should therefore aim to
keepat least 512 MB to 1 GB of RAM free when all VMs are powered up.

http://msdn.microsoft.com/en-us/library/dd405549(v=vs.85).aspx http://backupchain.com/UnderstandingSaved-State-Hyper-V-Backup.html
QUESTION 94
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V
server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is
configured as shown in the following table.

VM3 is used to test applications.


You need to prevent VM3 from synchronizing its clock to Server1.
What should you configure?
A.
B.
C.
D.
E.
F.
G.
H.
I.
J.
K.

NUMA topology
Resource control
resource metering
virtual Machine Chimney
the VLAN ID
Processor Compatibility
the startup order
Automatic Start Action
Integration Services
Port mirroring
Single-root I/O virtualization

Correct Answer: I
Section: (none)
Explanation
Explanation/Reference:
Explanation:
By default when you install the Integration Services/Components you get time synchronization with the host
OS, here is how to disable ongoing time synchronization. When you install the integration services/
components in Hyper-V virtual machine you get a set of services installed and enabled by default.
Operating system shutdown
Time synchronization
Data exchange heartbeat
Backup via VSS
If you do not want the virtual machine to continuously synch its time to the Hyper-V host using the integration
service, you can disable the integration service from the Hyper-V manager.
Open up the settings for the VM
Under Management, highlight the Integration Services option and you will get a list of the Integration Services
installed and enabled Uncheck the Time Synchronization service and press Apply. The virtual machine will
now not sync its time with the Hyper-V host on a continuous basis....BUT it will always sync once at power on.
This is required to boot strap the timer inside the virtual machine

http://www.virtualizationadmin.com/kbase/VirtualizationTips/ServerVirtualization/MicrosoftHyper- VTips/
PerformanceandScalability/DisablingTimeSyncinaVM.html http://blogs.technet.com/b/virtualization/
archive/2008/08/29/backing-up-hyper-v- virtualmachines.aspx
QUESTION 95
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V
server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is
configured as shown in the following table.

You need to configure VM4 to track the CPU, memory, and network usage.
What should you configure?
A.
B.
C.
D.
E.
F.
G.
H.
I.
J.
K.

NUMA topology
Resource control
resource metering
Virtual Machine Chimney
the VLAN ID
Processor Compatibility
the startup order
Automatic Start Action
Integration Services
Port mirroring
Single-root I/O virtualization

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://blogs.technet.com/b/meamcs/archive/2012/05/28/hyper-v-resource-metering-inwindows- server-2012server-8-beta.aspx
Metrics
collected for each virtual machine using resource metering:
Average CPU usage, measured in megahertz over a period of time.
Average physical memory usage, measured in megabytes.
Minimum memory usage (lowest amount of physical memory). Maximum memory usage (highest amount of
physical memory). Maximum amount of disk space allocated to a virtual machine. Total incoming network
traffic, measured in megabytes, for a virtual network adapter. Total outgoing network traffic, measured in
megabytes, for a virtual network adapter
QUESTION 96
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V
server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is
configured as shown in the following table.

You need to ensure that VM1 can use more CPU time than the other virtual machines when the CPUs on
Server1 are under a heavy load.
What should you configure?
A.
B.
C.
D.
E.
F.
G.
H.
I.
J.
K.

NUMA topology
Resource control
resource metering
Virtual Machine Chimney
The VLAN ID
Processor Compatibility
The startup order
Automatic Start Action
Integration Services
Port mirroring
Single-root I/O virtualization

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
B. Resource controls provide you with several ways to control the way that Hyper-V allocates resources to
virtual machine
When you create a virtual machine, you configure the memory and processor to provide the appropriate
computing resources for the workload you plan to run on the virtual machine. This workload consists of the
guest operating system and all applications and services that will run at the same time on the virtual machine.
Resource controls provide you with several ways to control the way that Hyper-V allocates resources to virtual
machines.
Virtual machine reserve. Of the processor resources available to a virtual machine, specifies the percentage
that is reserved for the virtual machine. This setting guarantees that the percentage you specify will be
available to the virtual machine. This setting can also affect how many virtual machines you can run at one
time.
Virtual machine limit. Of the processor resources available to a virtual machine, specifies the maximum
percentage that can be used by the virtual machine. This setting applies regardless of whether other virtual
machines are running.
Relative weight. Specifies how Hyper-V allocates resources to this virtual machine when more than one virtual
machine is running and the virtual machines compete for resources. http://technet.microsoft.com/en-us/library/
cc742470.aspx

QUESTION 97
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V
server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is
configured as shown in the following table.

VM2 sends and receives large amounts of data over the network. You need to ensure that the network traffic
of VM2 bypasses the virtual switches of the parent partition.
What should you configure?
A.
B.
C.
D.

NUMA topology
Resource control
Resource metering
Virtual Machine Chimney

E.
F.
G.
H.
I.
J.
K.

The VLAN ID
Processor Compatibility
The startup order
Automatic Start Action
Integration Services
Port mirroring
Single-root I/O virtualization

Correct Answer: K
Section: (none)
Explanation
Explanation/Reference:
Explanation:
K. SR-IOV maximizes network throughput while minimizing network latency as well as the CPU overhead
required for processing network traffic.
http://technet.microsoft.com/en-us/library/hh831410.aspx

QUESTION 98
Your network contains an Active Directory domain named contoso.com. The network contains a member
server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server server role installed
and has a primary zone for contoso.com. The Active Directory domain contains 500 client computers. There
are an additional 20 computers in a workgroup. You discover that every client computer on the network can
add its record to the contoso.com zone. You need to ensure that only the client computers in the Active
Directory domain can register records in the contoso.com zone.
What should you do first?
A.
B.
C.
D.

Move the contoso.com zone to a domain controller that is configured as a DNS server
Configure the Dynamic updates settings of the contoso.com zone
Sign the contoso.com zone by using DNSSEC
Configure the Security settings of the contoso.com zone.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
If you install DNS server on a non-DC, then you are not able to create AD-integrated zones. DNS update
security is available only for zones that are integrated into AD DS. When you directory- integrate a zone,
access control list (ACL) editing features are available in DNS Managerso that you can add or remove users or
groups from the ACL for a specified zone or resource record. http://technet.microsoft.com/en-us/library/
cc771255.aspx http://social.technet.microsoft.com/Forums/en-US/winserverNIS/thread/9b041bbc-07654eedbd1cd65027f05e9f/
http://blogs.msmvps.com/acefekay/2012/11/19/ad-dynamic-dns-updates-registration-rulesof- engagement/
1. Active Directory's DNS Domain Name is NOT a single label name ("DOMAIN" vs the minimal requirement
of"domain.com." "domain.local," etc).
2. The Primary DNS Suffix MUST match the zone name that is allowing updates. Otherwise the client

doesn'tknow what zone name to register in.


You can also have a different Conneciton Specific Suffix in addition to thePrimary DNS Suffix to register into
that zone as well.
3. AD/DNS zone MUST be configured to allow dynamic updates, whether Secure or Secure and Non-Secure.
For client machines, if a client is not joined to the domain, and the zone is set to Secure, it will
notregistereither.
4. You must ONLY use the DNS servers that host a copy of the AD zone name or have a reference to get
tothem. Do not use your ISP's, an external DNS adddress, your router as a DNS address, or any other DNS
thatdoes not have a copy of the AD zone. Internet resolution for your machines will be accomplished by the
Rootservers (Root Hints), however it's recommended to configure a forwarder for efficient Internet resolution. .
5. The domain controller is multihomed (which means it has more than one unteamed, active NIC, more
thanone IP address, and/or RRAS is installed on the DC).
6. The DNS addresses configured in the client's IP properties must ONLY reference the DNS server(s)
hostingthe AD zone you want to update in. This means that you must NOT use an external DNS in any
machine's IP property in an AD environment.
You can't mix them either. That's because of the way the DNS Client side resolver service works. Even if
youmix up internal DNS and ISP's DNS addresses, the resolver algorithm can still have trouble asking the
correctDNS server. It will ask the first one first. If it doesn't get a response, it removes the first one from the
eligibleresolvers list and goes to the next in the list. It will not go back to the first one unless you restart the
machine,restart the DNS Client service, or set a registry entry to cut the query TTL to 0. The rule is to ONLY
use yourinternal DNS server(s) and configure a forwarder to your ISP's DNS for efficient Internet resolution.
This is the reg entry to cut the query to 0 TTL:
The DNS Client service does not revert to using the first server ...The Windows 2000 Domain Name System
(DNS) Client service (Dnscache) follows a certain algorithm when it decides the order in which to use the
DNSservers ...
http://support.microsoft.com/kb/286834
For more info, please read the following on the client side resolver service:
DNS, WINS NetBIOS & the Client Side Resolver, Browser Service, Disabling NetBIOS, Direct Hosted SMB
(DirectSMB), If One DC is Down Does a Client logon to Another DC, and DNS Forwarders Algorithm if
youhave multiple forwarders.
http://msmvps.com/blogs/acefekay/archive/2009/11/29/dns-wins-netbios-amp-the-clientside- resolverbrowserservice-disabling-netbios-direct-hosted-smb-directsmb-if-one-dc-isdown-does-a- client-logon-toanother-dcand-dns-forwarders-algorithm.aspx
7. For DHCP clients, DHCP Option 006 for the clients are set to the same DNS server.
8. If using DHCP, DHCP server must only be referencing the same exact DNSserver(s) in it's own IP
properties in order for it to 'force' (if you setthat setting) registration into DNS. Otherwise, how would it know
which DNSto send the reg data to?
9. If the AD DNS Domain name is a single label name, such as "EXAMPLE", and not the proper format
of"example.com" and/or any child of that format, such as "child1.example.com", then we have a real big
problem.
DNS will not allow registration into a single label domain name.
This is for two reasons:
1. It's not the proper hierachal format. DNS is hierarchal, but a single label name has no hierarchy.
It's just asingle name.
2. Registration attempts causes major Internet queriesto the Root servers. Why? Because it thinks thesingle
label name, such as "EXAMPLE", is a TLD(Top Level Domain), such as "com", "net", etc. Itwill now try to find
what Root name server out therehandles that TLD. In the end it comes back to itselfand then attempts to
register. Unfortunately it doe NOTask itself first for the mere reason it thinks it's a TLD.
(Quoted from Alan Woods, Microsoft, 2004):
"Due to this excessive Root query traffic, which ISC found from a study that discovered Microsoft DNS
serversare causing excessive traffic because of single label names, Microsoft, being an internet friendly
neighbor andwanting to stop this problem for their neighbors, stopped the ability to register into DNS with
Windows 2000SP4, XP SP1, (especially XP,which cause lookup problems too), and Windows 2003. After all,
DNS ishierarchal, so therefore why even allow single label DNS domain names?"
The above also *especially* Applies to Windows Vista, &, 2008, 2008 R2, and newer.
10. 'Register this connection's address" on the client is not enabled under the NIC's IP properties, DNS tab.
11. Maybe there's a GPO set to force Secure updates and the machine isn't a joined member of the domain.
12. ON 2000, 2003 and XP, the "DHCP client" Service not running. In 2008/Vista and newer, it's the DNSClient

Service. This is a requirement for DNS registration and DNS resolution even if the client is not actuallyusing
DHCP.
13. You can also configure DHCP to force register clients for you, as well as keep the DNS zone clean of old
orduplicate entries. See the link I posted in my previous post.
QUESTION 99
Your company has a remote office that contains 1,600 client computers on a single subnet. You need to select
a subnet mask for the network that will support all of the client computers. The solution must minimize the
number of unused addresses.
Which subnet mask should you select?
A.
B.
C.
D.

255.255.248.0
255.255.252.0
255.255.254.0
255.255.240.0

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
255.255.252.0 = 11111111.11111111.11111100.00000000 =>( 22 bits 1 .. 10 bits 0 ) => 1111111111 = 1023
255.255.254.0 = 11111111.11111111.11111110.00000000 =>( 23 bits 1 .. 9 bits 0 ) => 111111111 =
255.255.255.0 = 11111111.11111111.11111111.00000000 =>( 24 bits 1 .. 8 bits 0 ) => 11111111 = 255
255.255.255.128 = 11111111.11111111.11111111.10000000 =>( 25 bits 1 .. 7 bits 0 ) => 1111111 = http://
zeus.fh-brandenburg.de/~ihno/doc/lehre/internet/ip_eng.html

QUESTION 100
You work as a senior administrator at L2P.com. The L2P.com network consists of a single domain named
L2P.com. All servers on the L2P.com network have Windows Server 2012 R2 installed, and all workstations
have Windows 8 installed.
You are running a training exercise for junior administrators. You are currently discussing a Windows
PowerShell cmdlet that activates previously de-activated firewall rules.
Which of the following is the cmdlet being discussed?
A. Set-NetFirewallRule
B. Enable-NetFirewallRule

C. Set-NetIPsecRule
D. Enable-NetIPsecRule
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Enable-NetFirewallRule - Enables a previously disabled firewall rule. http://technet.microsoft.com/en-us/library/
cc990290(v=ws.10).aspx http://technet.microsoft.com/en-us/library/jj574205.aspx http://
mikefrobbins.com/2013/02/28/use-powershell-to-remotely-enable-firewall-exceptions-on- windows- server2012/
http://technet.microsoft.com/en-us/library/jj554869%28v=wps.620%29.aspx
QUESTION 101
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 is located on the
same subnet as all of the client computers. A network technician reports that he receives a "Request timed
out" error message when he attempts to use the ping utility to connect to Server1 from his client computer. The
network technician confirms that he can access resources on Server1 from his client computer.
You need to configure Windows Firewall with Advanced Security on Server1 to allow the ping utility to connect.
Which rule should you enable?
A.
B.
C.
D.

File and Printer Sharing (Echo Request - ICMPv4-In)


Network Discovery (WSD-In)
File and Printer Sharing (NB-Session-In)
Network Discovery (SSDP-In)

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Ping uses ICMP
Open Control Panel, then select System and Security by clicking on that header Select Windows Firewall,
Advanced SettingsIn `Windows Firewall with Advanced security' click on `Inbound rules' Scroll down to `File
and Printer sharing(Echo request ICMPv4-In).
Right click on the rule and select `Enable rule'

Make sure that it turns green

Powershell:
Import-Module NetSecurity
Set-NetFirewallRule -DisplayName "File and Printer Sharing (Echo Request ?ICMPv4-In)" -enabled True
QUESTION 102
You have a file server named Server1 that runs Windows Server 2012 R2. You need to ensure that a user
named User1 can use Windows Server Backup to create a complete backup of Server1.
What should you configure?
A.
B.
C.
D.

The local groups by using Computer Management


A task by using Authorization Manager
The User Rights Assignment by using the Local Group Policy Editor
The Role Assignment by using Authorization Manager

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. User needs to be added to local Backup Operator group B. AzMan is a role-based access control (RBAC)
framework that provides an administrative tool to manage authorization policy and a runtime that allows
Applications to perform access checks against that policy.
C. User Rights Assignment policies determines which users or groups have logon rights or privileges on the
computer
D. AzMan is a role-based access control (RBAC) framework that provides an administrative tool to manage
authorization policy and a runtime that allows Applications to perform access checks against that policy.
http://technet.microsoft.com/en-us/library/cc780182(v=ws.10).aspx http://msdn.microsoft.com/en-us/library/
bb897401.aspx
QUESTION 103
Your network contains a production Active Directory forest named contoso.com and a test Active Directory
forest named contoso.test. A trust relationship does not exist between the forests. In the contoso.test domain,
you create a backup of a Group Policy object (GPO) named GPO1. You transfer the backup of GPO1 to a
domain controller in the contoso.com domain. You need to create a GPO in contoso.com based on the settings
of GPO1. You must achieve this goal by using the minimum amount of Administrative effort.
What should you do?
A. From Windows PowerShell, run the Get-GPO cmdlet and the Copy- GPO cmdlet.
B. From Windows PowerShell, run the New-GPO cmdlet and the Import- GPO cmdlet.
C. From Group Policy Management, create a new starter GPO. Right-click the new starter GPO, and then
click Restore from Backup.
D. From Group Policy Management, right-click the Croup Policy Objects container, and then click Manage
Backups.
Correct Answer: B
Section: (none)

Explanation
Explanation/Reference:
Explanation:
A. Copy-GPO requires domain trust / copy from one domain to another domain within the same forest.
B. The Import-GPO cmdlet imports the settings from a GPO backup into a specified target GPO. Thetarget
GPO can be in a different domain or forest than that from which the backup was made and itdoes not have to
exist prior to the operation.
C.
D: You can also restore GPOs. This operation takes a backed-up GPO and restores it to the same domain
from rom the GPO's original
which it was backed up. You cannot restore a GPO from backup into a domain different f domain. The NewGPO cmdlet creates a new GPO with a specified name. By default, the newly created GPO is not linked to a
site, domain, or organizational unit (OU). The Import-GPO cmdlet imports the settings from a GPO backup into
a specified target GPO. The target GPO can be in a different domain or forest than that from which the backup
was made and it does not have to exist prior to the operation.
The Restore-GPO cmdlet restores a GPO backup to the original domain from which it was saved. If the original
domain is not available, or if the GPO no longer exists in the domain, the cmdlet fails. http://
technet.microsoft.com/en-us/library/cc781458(v=WS.10).aspx http://technet.microsoft.com/en-us/library/
hh967461.aspx http://technet.microsoft.com/en-us/library/ee461050.aspx http://technet.microsoft.com/en-us/
library/ee461044.aspx http://blogs.technet.com/b/askpfeplat/archive/2012/11/04/windows-server-2012-thenew-and- improved- group-policy-management-console.aspx
QUESTION 104
Your network contains an active directory forest. The forest functional level is Windows server 2012. The forest
contains a single domain. The domain contains a member server named Server1 that run windows server
2012.
You purchase a network scanner named Scanner1 that
supports Web Services on Devices (WDS).
You need to share the network scanner on Server1
Which server role should you install on Server1?
A.
B.
C.
D.

Web Server (IIS)


Fax Server
File and Storage Services
Print and Document Services

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Print and Document Services enables you to centralize print server and network printer tasks. With this role,
you can also receive scanned documents from network scanners and route the documents to a shared
network resource, Windows SharePoint Services site, or email addresses. Windows Server 2012 uses Web
Services on Devices (WSD) technologies to integrate scanning devices into the system
http://technet.microsoft.com/en-us/library/hh831468.aspx http://technet.microsoft.com/en-us/library/
jj134196.aspx
QUESTION 105
Your network contains an Active Directory forest named adatum.com. The forest contains a child domain
named asia.adatum.com. The asia.adatum.com child domain contains a server named DHCP1 that runs
Windows Server 2012 R2.
You install the DHCP Server server role on DHCP1.
You have access to the administrative accounts shown in the following table.

You need to authorize DHCP1.


Which user account should you use?
A.
B.
C.
D.

Admin1
Admin2
Admin3
Admin4

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc759688(v=ws.10).aspx
QUESTION 106
You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has following storage spaces:
- Data
- Users
- Backups
- Primordial
You add an additional hard disk to Server1.
You need to identify which storage space contains the new hard disk.
Which storage space contains the new disk?
A.
B.
C.
D.

Data
Primordial
Users
Backups

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
New Disks (Unallocated space) added to Primordial spacePrimordial Pool? All storage that meets acceptable
criteria for Storage Spaces will be placed in the Primordial Pool. Thiscan be considered the default pool for
devices from which any other pools will be created. Notice that there are no other virtual disks or pools at this
point. The Primordial Pool will only consist ofphysical storage devices that do not belong to any other pools.

http://blogs.technet.com/b/canitpro/archive/2012/12/13/storage-pools-dive-right-in.aspx http://
blogs.technet.com/b/askpfeplat/archive/2012/10/10/windows-server-2012-storagespaces-is- it-for-youcouldbe.aspx
QUESTION 107
You have a server named Server1. Server1 runs Windows Server 2012 R2 and has the File and Storage
Services server role installed.
You attach four 500-GB disks to Server1.
You need to configure the storage to meet the following requirements:
- Storage for an application named Application1 must be provided. Application1 requires 20 GB and will require
a maximum of 800 GB in three years.
- Storage for an application named Application2 must be provided. Application2 requires 20 GB and will require
a maximum of 900 GB in three years.
- The solution must provide the ability to dynamically add storage without requiring configuration changes to
the applications.
- The storage must be available if a single disk fails.

Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
E.

From File and Storage Services, create virtual disks by using fixed provisioning.
From File and Storage Services, create a storage pool that uses all four disks.
From Disk Management, create two new mirror volumes that use two disks each.
From Disk Management, create a new RAID-5 volume that uses all four disks.
From File and Storage Services, create virtual disks by using thin provisioning.

Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Original answer is AB.
't be A, because a fixed disk can't get expanding.
But the correct answer is B and E. it can
QUESTION 108
Your network contains multiple subnets.
On one of the subnets, you deploy a server named Server1 that runs Windows Server 2012 R2. You install the
DNS Server server role on Server1, and then you create a standard primary zone named contoso.com.
You need to ensure that client computers can resolve single-label names to IP addresses.
What should you do first?
A.
B.
C.
D.

Create a reverse lookup zone.


Convert the contoso.com zone to an Active Directory-integrated zone.
Configure dynamic updates for contoso.com.
Create a GlobalNames zone.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
D. use GlobalNames zones in Windows Server 2008 to take advantage of single-label names Providing
Single-Label DNS Name Resolution:
While Domain Name System (DNS) is the predominant name-resolution technology in TCP/IP networks,
Windows Internet Name Service (WINS) is deployed in many networks as an alternative
Get Latest & Actual 70-410 Exam's Question and Answers from Passleader.
name-resolution protocol.
GlobalNames Zone (GNZ) feature: The GNZ feature is designed to enable DNS resolution of these singlelabel, static, global names. You can deploy a GNZ in a single forest or across multiple forests. GNZ is intended
to aid the retirement of WINS. It is not a replacement for WINS. GNZ is not intended to support the single-label
name resolution of records that are registered dynamically and therefore not managed by IT administrators.
GNZ does make it possible for you to provide single- label name resolution of a fixed set of host computers
whose names are guaranteed to be both global and unique.
http://technet.microsoft.com/en-us/library/cc731744.aspx http://technet.microsoft.com/en-us/library/cc816610
(v=ws.10).aspx
QUESTION 109
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has six network adapters. Two
of the network adapters are connected to a network named LAN1, two of the network adapters are connected

to a network named LAN2, and two of the network adapters are connected to a network named LAN3.
You create a network adapter team named Team1 from the two adapters connected to LAN1. You create a
network adapter team named Team2 from the two adapters connected to LAN2. A company policy states that
all server IP addresses must be assigned by using a reserved address in DHCP.
You need to identify how many DHCP reservations you must create for Server1.
How many reservations should you identify?
A.
B.
C.
D.

3
4
6
8

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
2 Adapters = LAN1 = Team1 = 1 IP
2 Adapters = LAN2 = Team2 = 1 IP
2 Adapters = LAN3 = No Team = 2 IP
1+1+2=4
QUESTION 110
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012
R2. The domain contains a server named Server1. You open Review Options in the Active Directory Domain
Services Configuration Wizard, and then you click View script.
You need to ensure that you can use the script to promote Server1 to a domain controller.
Which file extension should you use to save the script?
A.
B.
C.
D.

.pal
.bat
.xml
.cmd

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 111
Your network contains an Active Directory domain named contoso.com. The network contains
500 client computers that run Windows 8.
All of the client computers connect to the Internet by using a web proxy. You deploy a server named Server1
that runs Windows Server 2012 R2.
Server1 has the DNS Server server role installed.
You configure all of the client computers to use Server1 as their primary DNS server. You need to prevent
Server1 from attempting to resolve Internet host names for the client computers.
What should you do on Server1?
A. Create a primary zone named ".".
B. Configure the Security settings of the contoso.com zone.
C. Create a zone delegation for GlobalNames.contoso.com.

D. Create a stub zone named "root".


Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
When you install DNS on a Windows server that does not have a connection to the Internet, the zone for the
domain is created and a root zone, also known as a dot zone, is also created. This root zone may prevent
access to the Internet for DNS and for clients of the DNS. If there is a root zone, there are no other zones other
than those that are listed with DNS, and you cannot configure forwarders or root hint servers.
Root domain
This is the top of the tree, representing an unnamed level; it is sometimes shown as two empty quotation
marks (""), indicating a null value. When used in a DNS domain name, it is stated by a trailing period (.) to
designate that the name is located at the root or highest level of the domain hierarchy. In this instance, the
DNS domain name is considered to be complete and points to an exact location in the tree of names. Names
stated this way are called fully qualified domain names (FQDNs).
DNS Domain Name Hierarchy:

QUESTION 112
Your network contains an Active Directory domain named contoso.com. The domain contains 100 user
accounts that reside in an organizational unit (OU) named 0U1. You need to ensure that a user named User1
can link and unlink Group Policy objects (GPOs) to OU1. The solution must minimize the number of
permissions assigned to User1.
What should you do?
A.
B.
C.
D.

Modify the permissions on OU1.


Run the Set-GPPermission cmdlet.
Add User1 to the Group Policy Creator Owners group.
Modify the permissions on the User1 account.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.howtogeek.com/50166/using-the-delegation-of-control-wizard-to-assign-permissions- in-server2008/

QUESTION 113
You have a server that runs Windows Server 2012 R2.
The server contains the disks configured as shown in the following table.

You need to create a volume that can store up to 3 TB of user files. The solution must ensure that the user
files are available if one of the disks in the volume fails.
What should you create?
A. a mirrored volume on Disk 1 and Disk 4
B. a mirrored volume on Disk 2 and Disk 3

C. a RAID-5 volume on Disk 1, Disk 2, and Disk 3


D. a spanned volume on Disk 0 and Disk 4
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A mirrored volume provides an identical twin of the selected volume. All data written to the mirrored volume is
written to both volumes, which results in disk capacity of only 50 percent. Any volume can be mirrored,
including the system and boot volumes. The disk that you select for the shadow volume does not need to be
identical to the original disk in size, or in its number of tracks and cylinders. This means that you do not have to
replace a failed disk with an identical model. The unused area that you select for the shadow volume cannot
be smaller than the original volume. If the area that you select for the shadow volume is larger than the
original, the extra space on the shadow disk can be configured as another volume.
Dynamic disks provide features that basic disks do not, such as the ability to create volumes that span multiple
disks (spanned and striped volumes) and the ability to create fault-tolerant volumes (mirrored and RAID-5
volumes).
The following operations can be performed only on dynamic disks:
Create and delete simple, spanned, striped, mirrored, and RAID-5 volumes. Extend a simple or spanned
volume. Remove a mirror from a mirrored volume or break the mirrored volume into two volumes. Repair
mirrored or RAID-5 volumes. Reactivate a missing or offline disk. You need at least two dynamic disks to
create a mirrored volume. Mirrored volumes are fault tolerant and use RAID-1, which provides redundancy by
creating two identical copies of a volume.
Mirrored volumes cannot be extended.
Both copies (mirrors) of the mirrored volume share the same drive letter.

http://technet.microsoft.com/en-us/library/cc779765%28v=ws.10%29.aspx http://msdn.microsoft.com/en-us/
library/windows/desktop/aa363785%28v=vs.85%29.aspx http://technet.microsoft.com/en-us/library/
cc938487.aspx
QUESTION 114
What should you do for server core so it can be managed from another server 2012 R2?

A.
B.
C.
D.
E.
F.
G.
H.
I.
J.
K.
L.
M.
N.
O.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15

Correct Answer: H
Section: (none)
Explanation
Explanation/Reference:
Explanation:
4) Configure Remote Management is already "Enabled". 8)
Network Settings
You can configure the IP address to be assigned automatically by a DHCP Server or you can assign a static IP
address manually. This option allows you to configure DNS Server settings for the server as well.
http://technet.microsoft.com/en-us/library/jj647766.aspx
QUESTION 115
Your network contains an Active Directory domain named contoso.com.
The domain contains a server named Server1.
Server1 runs Windows Server 2012 R2. On Server1, you create a printer named Printer1.

You share Printer1 and publish Printer1 in Active Directory. You need to provide a group named Group1 with
the ability to manage Printer1.
What should you do?
A.
B.
C.
D.

From Print Management, configure the Sharing settings of Printer1.


From Active Directory Users and Computers, configure the Security settings of Server1-Printer1.
From Print Management, configure the Security settings of Printer1.
From Print Management, configure the Advanced settings of Printer1.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Set permissions for print servers
Note:
Open Print Management.
In the left pane, clickPrint Servers, right-click the App1icable print server and then clickProperties. On
theSecuritytab, underGroup or users names, click a user or group for which you want to set permissions.
UnderPermissions for <user or group name>, select theAlloworDenycheck boxes for the permissions listed as
needed.
To editSpecial permissions, clickAdvanced.
On thePermissionstab, click a user group, and then clickEdit. In thePermission Entrydialog box, select
theAlloworDenycheck boxes for the permissions that you want to edit.

QUESTION 116
Your network contains an Active Directory domain named contoso.com.
All servers run Windows Server 2012 R2.
Client computers run either Windows 7 or Windows 8.
All of the computer accounts of the client computers reside in an organizational unit (OU) named Clients. A
Group Policy object (GPO) named GP01 is linked to the Clients OU. All of the client computers use a DNS
server named Server1.
You configure a server named Server2 as an ISATAP router. You add a host (A) record for ISATAP to the
contoso.com DNS zone. You need to ensure that the client computers locate the ISATAP router.
What should you do?
A.
B.
C.
D.

Run the Add-DnsServerResourceRecord cmdlet on Server1.


Configure the DNS Client Group Policy setting of GPO1.
Configure the Network Options Group Policy preference of GPO1.
Run the Set-DnsServerGlobalQueryBlockList cmdlet on Server1.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Windows Server 2008 introduced a new feature, called "Global Query Block list", which prevents somearbitrary
machine from registering the DNS name of WPAD. This is a good security feature, as it prevents someone
from just joining your network, and setting himself up asa proxy. The dynamic update feature of Domain Name
System (DNS) makes it possible for DNS client computers toregister and dynamically update their resource
records with a DNS server whenever a client changes itsnetwork address or host name. This reduces the need
for manual administration of zone records. This convenience comes at a cost, however,because any
authorized client can register any unused host name, even a host name that might havespecial significance for
certain Applications. This can allow a malicious user to take over a special nameand divert certain types of
network traffic to that user's computer. Two commonly deployed protocols are particularly vulnerable to this
type of takeover: the Web ProxyAutomatic Discovery Protocol (WPAD) and the Intra-site Automatic Tunnel
Addressing Protocol (ISATAP). Even if a network does not deploy these protocols, clients that are configured
to use them are vulnerable to thetakeover that DNS dynamic update enables. Most commonly, ISATAP hosts
construct their PRLs by using DNS to locate a host named isatap on the localdomain.
For example, if the local domain is corp.contoso.com, an ISATAP-enabled host queries DNS to obtainthe IPv4
address of a host named
isatap.corp.contoso.com. In its default configuration, the Windows Server 2008 DNS Server service maintains
a list of names that, ineffect, it ignores when it receives a query to resolve the name in any zone for which the
server is authoritative. Consequently, a malicious user can spoof an ISATAP router in much the same way as
a malicious user canspoof a WPAD server: A malicious user can use dynamic update to register the user's
own computer as acounterfeit ISATAP router and then divert traffic between ISATAP-enabled computers on
the network. The initial contents of the block list depend on whether WPAD or ISATAP is already deployed
when you addthe DNS server role to an existing Windows Server 2008 deployment or when you upgrade an
earlier versionof Windows Server running the DNS Server service.
Add- DnsServerResourceRecord - The Add-DnsServerResourceRecordcmdlet adds a resource record for
aDomain Name System (DNS) zone on a DNS server. You can add different types of resource records. Use
different switches for different record types. By using this cmdlet, you can change a value for a record,
configure whether a record has a time stamp,whether any authenticated user can update a record with the
same owner name, and change lookup timeoutvalues, Windows Internet Name Service (WINS) cache
settings, and replication settings.
Set-DnsServerGlobalQueryBlockList - The SetDnsServerGlobalQueryBlockListcmdlet changes settingsof a global query block list on a Domain Name
System (DNS) server. This cmdlet replaces all names in the list of names that the DNS
server does not resolve with the names thatyou specify. If you need the DNS server to resolve names such as
ISATAP and WPAD, remove these names from the list. Web Proxy Automatic Discovery Protocol (WPAD) and
Intra-site Automatic Tunnel Addressing Protocol(ISATAP) are two commonly deployed protocols that are
particularly vulnerable to hijacking. http://technet.microsoft.com/en-us/library/jj649857(v=wps.620).aspx http://
technet.microsoft.com/en-us/library/cc794902%28v=ws.10%29.aspx http://technet.microsoft.com/en-us/
security/bulletin/ms09-008 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0093 Windows
DNS Server in Microsoft Windows 2000 SP4, Server 2003 SP1 and SP2, and Server 2008, whendynamic
updates are enabled, does not restrict registration of the "wpad" hostname, which allows remoteauthenticated
users to hijack the Web Proxy AutoDiscovery (WPAD) feature, and conduct man-in-the-middleattacks by
spoofing a proxy server, via a Dynamic Update request for this hostname, aka "DNS ServerVulnerability in
WPAD Registration Vulnerability," a related issue to CVE- 2007-1692.
QUESTION 117
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1 that runs Windows Server 2012 R2 and has the Remote Access server role installed.
A user named User1 must connect to the network remotely. The client computer of User1 requires Challenge
Handshake Authentication Protocol (CHAP) for remote connections.
CHAP is enabled on Server1.
You need to ensure that User1 can connect to Server1 and authenticate to the domain. What should you do
from Active Directory Users and Computers?
A. From the properties of Server1, select Trust this computer for delegation to any service (Kerberos only).
B. From the properties of Server1, assign the Allowed to Authenticate permission to User1.
C. From the properties of User1, select Use Kerberos DES encryption types for this account.

D. From the properties of User1, select Store password using reversible encryption.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The Store password using reversible encryption policy setting provides support for Applications that
useprotocols that require the user's password for authentication. Storing encrypted passwords in a way that
isreversible means that the encrypted passwords can be decrypted. A knowledgeable attacker who is able
tobreak this encryption can then log on to network resources by using the compromised account. For this
reason,never enable Store password using reversible encryption for all users in the domain unless
Applicationrequirements outweigh the need to protect password information. If you use the Challenge
Handshake Authentication Protocol (CHAP) through remote access or InternetAuthentication Services (IAS),
you must enable this policy setting. CHAP is an authentication protocolthat is used by remote access and
network connections. Digest Authentication in Internet Information Services(IIS) also requires that you enable
this policy setting. If your organization uses CHAP through remote access or IAS, or Digest Authentication in
IIS, you mustconfigure this policy setting to Enabled. This presents a security risk when you Apply the setting
through GroupPolicy on a user-by-user basis because it requires the appropriate user account object to be
opened in ActiveDirectory Users and Computers.

http://technet.microsoft.com/pt-pt/library/hh994559%28v=ws.10%29.aspx
QUESTION 118
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 has a
virtual switch named RDS Virtual. You replace all of the network adapters on Server1 with new network
adapters that support single-root I/O visualization (SR-IOV).
You need to enable SR-IOV for all of the virtual machines on Server1. Which two actions should you perform?
(Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
E.

On each virtual machine, modify the Advanced Features settings of the network adapter.
Modify the settings of the RDS Virtual virtual switch.
On each virtual machine, modify the BIOS settings.
Delete, and then recreate the RDS Virtual virtual switch.
On each virtual machine, modify the Hardware Acceleration settings of the network adapter.

Correct Answer: DE
Section: (none)

Explanation
Explanation/Reference:
Explanation:
The first step when allowing a virtual machine to have connectivity to a physical network is to create an
external virtual switch using Virtual Switch Manager in Hyper-V Manager. The additional step that is necessary
when using SR-IOV is to ensure the checkbox is checked when the virtual switch is being created. It is not
possible to change a "non SR-IOV mode" external virtual switch into an "SR-IOV mode" switch. The choice
must be made a switch creation time.
E: Once a virtual switch has been created, the next step is to configure a virtual machine. SR-IOV in Windows
Server "8" is supported on x64 editions of Windows "8" as a guest operating system (as in Windows "8"
Server, and Windows "8" client x64, but not x86 client). We have rearranged the settings for a virtual machine
to introduce sub-nodes under a network adapter, one of which is the hardware acceleration node. At the
bottom is a checkbox to enable SR-IOV.

Note:
* Steps:
/ SR-IOV must be enabled on virtual switch
/ Install additional network drivers in the guest OS
/ Enable SR-IOV within the VMs though Hyper-V Manager
* Single Root I/O Virtualization (SR-IOV) is a standard introduced by the PCI-SIG that owns and manages PCI
specifications as open industry standards.
SR-IOV enables network traffic to bypass the software switch layer of the Hyper-V Virtualization stack to
reduce the I/O overhead in this layer. It allows an SR-IOV virtual function of a physical
network adapter to be assigned directly to a virtual machine to increase network throughput by reducing
latency. Host CPU overhead also get reduced for processing network traffic.

* The diagram below illustrates how SR-IOV allows virtual machines to directly address the physical NIC.

Reference: Everything you wanted to know about SR-IOV in Hyper-V Part 5


QUESTION 119
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 is a member of a
workgroup.
You need to configure a local Group Policy on Server1 that will apply only to non- administrators.
Which tool should you use?
A.
B.
C.
D.

Server Manager
Group Policy Management Editor
Group Policy Management
Group Policy Object Editor

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:

http://technet.microsoft.com/en-us/library/cc766291%28v=ws.10%29.aspx
QUESTION 120
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server! that runs Windows Server 2012 R2. Server1 contains a virtual machine named VM1 that runs
Windows Server 2012 R2. You need to ensure that a user named User1 can install Windows features on VM1.
The solution must minimize the number of permissions assigned to User1.
To which group should you add User1?
A.
B.
C.
D.

Administrators on VM1
Power Users on VM1
Hyper-V Administrators on Server1
Server Operators on Server1

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
In Windows Server 2012 R2, the Server Manager console and Windows PowerShell-cmdlets for
ServerManager allow installation of roles and features to local or remote servers, or offline virtual hard disks
(VHDs).
You can install multiple roles and features on a single remote server or offline VHD in a single Add Roles
andFeatures Wizard or Windows PowerShell session. You must be logged on to a server as an administrator
to install or uninstall roles, role services, andfeatures. If you are logged on to the local computer with an
account that does not have administrator rights onyour target server, right- click the target server in the
Servers tile, and then click Manage As to provide anaccount that has administrator rights. The server on which
you want to mount an offline VHD must be added toServer Manager, and you must have Administrator rights
on that server. http://technet.microsoft.com/en-us/library/hh831809.aspx

QUESTION 121
Your network contains an Active Directory domain named adatum.com. The domain contains a member server
named LON-DC1. LON-DC1 runs Windows Server 2012 R2 and has the DHCP Server server role installed.
The network contains 100 client computers and 50 IP phones. The computers and the phones are from the
same vendor.
You create an IPv4 scope that contains addresses from 172.16.0.1 to 172.16.1.254. You need to ensure that
the IP phones receive IP addresses in the range of 172.16.1.100 to 172.16.1.200. The solution must minimize
administrative effort.
What should you create?
A.
B.
C.
D.

Server level policies


Filters
Reservations
Scope level policies

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
When a client matches the conditions of a policy, the DHCP server responds to the clients based on the
settings of a policy.
Settings associated to a policy can be an IP address range and/or options. An administrator could configure
the policy to provide an IP address from a specified sub-range within the overall IP address range of the
scope.
You can also provide different option values for clients satisfying this policy. Policies can be defined server
wide or for a specific scope.
on the same lines as server wide option values - is applicable to all scopes A server wide policy
on the DHCP server.
A server wide policy however cannot have an IP address range associated with it. There a couple of ways to
segregate clients based on the type of device. One way to do this is by using vendor class/identifier. This string
sent in option 60 by most DHCP clients identify the vendor and thereby the type of the device.
Another way to segregate clients based on device type is by using the MAC address prefix. The first three
bytes of a MAC address is called OUI and identify the vendor or manufacturer of the device.
By creating DHCP policies with conditions based on Vendor Class or MAC address prefix, you can now
segregate the clients in your subnet in such a way, that devices of a specific type get an IP address only from
a specified IP address range within the scope. You can also give different set of options to these clients.
In conclusion, DHCP policies in Windows Server 2012 R2 enables grouping of clients/devices using the
different criteria and delivering targeted network configuration to them. Policy based assignment in Windows
Server 2012 R2 DHCP allows you to create simple yet powerful rules to administer DHCP on your network.

QUESTION 122
Your network contains an Active Directory forest. The forest contains a single domain named contoso.com.
The domain contains four domain controllers. The domain controllers are configured as shown in the following
table.

You plan to deploy a new domain controller named DC5 in the contoso.com domain. You need to identify
which domain controller must be online to ensure that DC5 can be promoted successfully to a domain
controller.
Which domain controller should you identify?

A.
B.
C.
D.

DC1
DC2
DC3
DC4

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Relative ID (RID) Master:
Allocates active and standby RID pools to replica domain controllers in the same domain. (corp.contoso.com)
Must be online for newly promoted domain controllers to obtain a local RID pool that is required to advertise or
when existing domain controllers have to update their current or standby RID pool allocation.
The RID master is responsible for processing RID pool requests from all domain controllers in a particular
domain. When a DC creates a security principal object such as a user or group, it attaches a unique Security
ID (SID) to the object.
This SID consists of a domain SID (the same for all SIDs created in a domain), and a relative ID (RID) that is
unique for each security principal SID created in a domain. Each DC in a domain is allocated a pool of RIDs
that it is allowed to assign to the security principals it creates. When a DC's allocated RID pool falls below a
threshold, that DC issues a request for additional RIDs to the domain's RID master. The domain RID master
responds to the request by retrieving RIDs from the domain's unallocated RID pool and assigns them to the
pool of the requesting DC At any one time, there can be only one domain controller acting as the RID master in
the domain.

The Infrastructure Master - The purpose of this role is to ensure that cross-domain objectreferences are
correctly handled. For example, if you add a user from one domain to a security group from a different domain,
the Infrastructure Master makes sure this is done properly. As you can guess however, if your Active Directory
deployment has only a single domain, then the Infrastructure Master role does no work at all, and even in a
multi-domain environment it is rarely used except when complex user administration tasks are performed, so
the machine holding this role doesn't need to have much horsepower at all.
http://support.microsoft.com/kb/223346
http://en.wikipedia.org/wiki/Flexible_single_master_operation
QUESTION 123
You have a server named Server 1. Server1 runs Windows Server 2012 R2.
Server1 has a thin provisioned disk named Disk1.
You need to expand Disk1.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. From File and Storage Services, extend Disk1.
B. From File and Storage Services, add a physical disk to the storage pool.

C. From Disk Management, extend the volume.


D. From Disk Management, delete the volume, create a new volume, and then format the volume.
E. From File and Storage Services, detach Disk1.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Step 1 (B): if required add physical disk capacity.
Step 2 (A): Dynamically extend the virtual disk (not volume). Windows Server 2012 Storage Space subsystem
now virtualizes storage by abstracting multiple physical disksinto a logical construct with specified capacity.
The process is to group selected physical disks into a container,the so-called storage pool, such that the total
capacity collectively presented by those associated physicaldisks can appear and become manageable as a
single and seemingly continuous space. Subsequently astorage administrator creates a virtual disk based on a
storage pool, configure a storage layout which isessentially a RAID level, and expose the storage of the virtual
disk as a drive letter or a mapped folder inWindows Explorer.
Get Latest & Actual 70-410 Exam's Question and Answers from Passleader.

The system administrator uses File and Storage Services in Server Manager or the Disk Management tool
torescan the disk, bring the disk online, and extend the disk size.

http://blogs.technet.com/b/yungchou/archive/2012/08/31/windows-server-2012- storagevirtualizationexplained.aspx
QUESTION 124
Your network contains an Active Directory domain named contoso.com.
The domain contains a member server named HVServer1.
HVServer1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. HVServer1 hosts two
virtual machines named Server1 and Server2. Both virtual machines connect to a virtual switch named
Switch1. On Server2, you install a network monitoring application named App1. You need to capture all of the
inbound and outbound traffic to Server1 by using App1.
Which two commands should you run from Windows PowerShell? (Each correct answer presents part of the
solution. Choose two.)
A.
B.
C.
D.
E.
F.

Get-VM "Server2" | Set-VMNetworkAdapter -IovWeight 1


Get-VM "Server1" | Set-VMNetworkAdapter -Allow/Teaming On
Get-VM "Server1" | Set-VMNetworkAdapter -PortMirroring Source
Get-VM "Server2" | Set-VMNetworkAdapter -PortMirroring Destination
Get-VM "Server1" | Set-VMNetworkAdapter -IovWeight 0
Get-VM "Server2" | Set-VMNetworkAdapter-AllowTeaming On

Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
C: Catching the traffic from Server1
D: Catching the traffic to Server1.
Note:
* Get-VM
Gets the virtual machines from one or more Hyper-V hosts.
-ComputerName<String[]>
Specifies one or more Hyper-V hosts from which virtual machines are to be retrieved. NetBIOS names, IP
addresses, and fully-qualified domain names are allowable. The default is the local computer -- use "localhost"
or a dot (".") to specify the local computer explicitly.
* Set-VMNetworkAdapter
Configures features of the virtual network adapter in a virtual machine or the management operating system.

* -PortMirroring<VMNetworkAdapterPortMirroringMode>
Specifies the port mirroring mode for the network adapter to be configured. Allowed values are None, Source,
and Destination. If a virtual network adapter is configured as Source, every packet it sends or receives is
copied and forwarded to a virtual network adapter configured to receive the packets. If a virtual network
adapter is configured as Destination, it receives copied packets from the source virtual network adapter. The
source and destination virtual network adapters must be connected to the same virtual switch. Specify None to
disable the feature.
Reference: Set-VMNetworkAdapter; Get-VM
http://technet.microsoft.com/en-us/library/hh848479%28v=wps.620%29.aspx http://technet.microsoft.com/enus/library/hh848457%28v=wps.620%29.aspx
QUESTION 125
Your network contains an Active Directory domain named adatum.com.
The domain contains a file server named Server2 that runs Windows Server 2012 R2. Server2 contains a
shared folder named Home. Home contains the home folder of each user. All users have the necessary
permissions to access only their home folder. A user named User1 opens the Home share as shown in the
exhibit. (Click the Exhibit button.)

You need to ensure that all users see only their own home folder when they access Home.
What should you do from Server2?
A.
B.
C.
D.

From Windows Explorer, modify the properties of Home.


From Server Manager, modify the properties of the volume that contains Home.
From Windows Explorer, modify the properties of the volume that contains Home.
From Server Manager, modify the properties of Home.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Access-based Enumeration is a new feature included with Windows Server 2003 Service Pack 1. This feature
based file servers to list only the files and folders to which they have allows users of Windows Server 2003
access when browsing content on the file server. This eliminates user confusion that can be caused when
users connect to a file server and encounter a large number of files and folders that they cannot access.
Access-based Enumeration filters the list of available files and folders on a server to include only those that the
requesting user has access to. This change is important because this allows users to see only those files and
directories that they have access to and nothing else. This mitigates the scenario where unauthorized users

might otherwise be able to see the contents of a directory even though they don't have access to it.
Access-Based Enumeration (ABE) can be enabled at the Share properties through Server Manager.

After implementation instead of seeing all folder including the ones the user does not have access
to:

User will have access just to the folder where has rights to:

If a user with full access browses the same folder it will show all 5230 folders. http://technet.microsoft.com/enus/library/cc784710%28v=ws.10%29.aspx http://technet.microsoft.com/pt-pt/library/dd772681%28v=ws.10%
29.aspx
QUESTION 126
You have a server named Server1 that runs a Server Core Installation of Windows Server 2012 R2
Datacenter.
You have a WIM file that contains the four images of Windows Server 2012 R2 as shown in the

Images exhibit. (Click the Exhibit button.)

You review the installed features on Server1 as shown in the Features exhibit. (Click the Exhibit button.)

You need to install the Server Graphical Shell feature on Server1. Which two possible sources can you use to
achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A.
B.
C.
D.

Index 1
Index 2
Index 3
Index 4

Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
When you install Windows Server 2012 R2 you can choose between Server Core Installation and Server with
a GUI. The "Server with a GUI" option is the Windows Server 2012 R2 equivalent of the Full installation option
available in Windows Server 2008 R2. The "Server Core Installation" option reduces the space required on
disk, the potential attack surface, and especially the servicing requirements, so we recommend that you
choose the Server Core installation unless you have a particular need for the additional user interface
elements and graphical management tools that are included in the "Server with a GUI" option. For this reason,
the Server Core installation is now the default. Because you can freely switch between these options at any
time later, one approach might be to initially install the Server with a GUI option, use the graphical tools to
configure the server, and then later switch to the Server Core Installation option. Reference: Windows Server
Installation Options
QUESTION 127
Your network contains two subnets. The subnets are configured as shown in the following table.

You have a server named Server1 that runs Windows Server 2012 R2.
Server1 is connected to LAN1.
You run the route print command as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that Server1 can communicate with the client computers on LAN2.
What should you do?
A.
B.
C.
D.

Change the default gateway address.


Set the state of the Teredo interface to disable.
Change the metric of the 10.10.1.0 route.
Set the state of the Microsoft ISATAP Adapter #2 interface to disable.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:

In general, the first and last addresses in a subnet are used as the network identifier and broadcast
address,respectively. All other addresses in the subnet can be assigned to hosts on that subnet. For example,
IP addresses of networks with subnet masks of at least 24 bits ending in .0 or .255 can never beassigned to
hosts. Such "last" addresses of a subnet are considered "broadcast" addresses and all hosts onthe
corresponding subnet will respond to it. Theoretically, there could be
situations where you can assign an address ending in .0: for example, if you havea subnet like
192.168.0.0/255.255.0.0, you are allowed to assign a host the address 192.168.1.0. It couldcreate confusion
though, so it's not a very common practice. Example10.6.43.0 with subnet 255.255.252.0 (22 bit subnet mask)
means subnet ID 10.6.40.0, a host address range from 10.6.40.1 to 10.6.43.254 and a broadcast
address10.6.43.255. So in theory, your example 10.6.43.0 would be allowed as a valid host address. The
default gateway address should not end in .0 with the /24 address http://tools.ietf.org/html/rfc4632
http://en.wikipedia.org/wiki/IPv4#Addresses_ending_in_0_or_255
QUESTION 128
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012
R2. The domain contains a member server named Server1.
Server1 has the File Server server role installed.
On Server1, you create a share named Documents. The Documents share will contain the files and folders of
all users.
You need to ensure that when the users connect to Documents, they only see the files to which they have
access.
What should you do?
A.
B.
C.
D.

Modify the NTFS permissions.


Modify the Share permissions.
Enable access-based enumeration.
Configure Dynamic Access Control.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Access-based Enumeration is a new feature included with Windows Server 2003 Service Pack 1. This
featureallows users of Windows Server 2003-Based file servers to list only the files and folders to which they
haveaccess when browsing content on the file server. This eliminates user confusion that can be caused
whenusers connect to a file server and encounter a large number of files and folders that they cannot
access.Access-based Enumeration filters the list of available files and folders on a server to include only those
that therequesting user has access to. This change is important because this allows users to see only those
files and directories that they haveaccess to and nothing else. This mitigates the scenario where unauthorized
users might otherwise be able tosee the contents of a directory even though they don't have access to it.
Access-Based Enumeration (ABE) can be enabled at the Share properties through Server Manager.

After implementation instead of seeing all folder including the ones the user does not have access
to:

User will have access just to the folder where has rights to:

If a user with full access browses the same folder - it will show all 5230 folders. http://technet.microsoft.com/
en-us/library/cc784710%28v=ws.10%29.aspx http://technet.microsoft.com/pt-pt/library/dd772681%
28v=ws.10%29.aspx
QUESTION 129
Your network contains an Active Directory domain named contoso.com. You have a starter Group Policy
object (GPO) named GPO1 that contains more than 100 settings. You need to create a new starter GPO
based on the settings in GPO1.
You must achieve this goal by using the minimum amount of administrative effort.

What should you do?


A. Run the New-GPStarterGPO cmdlet and the Copy-GPO cmdlet.
B. Create a new starter GPO and manually configure the policy settings of the starter GPO.
C. Right-click GPO1, and then click Back Up.
Create a new starter GPO.
Right-click the new GPO, and then click Restore from Backup.
D. Right-click GPO1, and then click Copy.
Right-click Starter GPOs, and then click Paste.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The New-GPStarterGPO cmdlet creates a Starter GPO with the specified name. If the Starter GPOs folder
does not exist in the SYSVOL when the New-GPStarterGPO cmdlet is called, it is created and populated with
the eight Starter GPOs that ship with Group Policy. The Copy-GPO cmdlet creates a (destination) GPO and
copies the settings from the source GPO to the new GPO. The cmdlet can be used to copy a GPO from one
domain to another domain within the same forest.
You can specify a migration table to map security principals and paths when copying across domains.
You can also specify whether to copy the access control list (ACL) from the source GPO to the destination
GPO.
http://technet.microsoft.com/en-us/library/ee461063.aspx http://technet.microsoft.com/en-us/library/
ee461050.aspx
QUESTION 130
Your network contains an Active Directory domain named contoso.com.
The domain contains a member server named Server1.
Server1 runs Windows Server 2012 R2 and has the DHCP Server server role installed. You create two IPv4
scopes on Server1. The scopes are configured as shown in the following table.

The DHCP clients in Subnet1 can connect to the client computers in Subnet2 by using an IP address or a
FQDN.
You discover that the DHCP clients in Subnet2 can connect to client computers in Subnet1 by using an IP
address only.
You need to ensure that the DHCP clients in both subnets can connect to any other DHCP client by using a
FQDN.
What should you add?
A.
B.
C.
D.

The 006 DNS Servers option to Subnet2


The 015 DNS Domain Name option to Subnet1
The 006 DNS Servers option to Subnet1
The 015 DNS Domain Name option to Subnet2

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:

Explanation:
http://technet.microsoft.com/en-us/library/ee941136%28v=WS.10%29.aspx
QUESTION 131
Your network contains an Active Directory domain named contoso.com. The domain contains two servers
named Server1 and Server2. Server1 runs Windows Server 2012 R2. Server2 runs Windows Server 2008 R2
Service Pack 1 (SP1) and has the DHCP Server server role installed.
You need to manage DHCP on Server2 by using the DHCP console on Server1.
What should you do first?
A.
B.
C.
D.

From Windows PowerShell on Server2, run Enable-PSRemoting cmdlet.


From Windows PowerShell on Server1, run Install-WindowsFeature.
From Windows Firewall with Advanced Security on Server2, create an inbound rule.
From Internet Explorer on Server2, download and install Windows Management Framework 3.0.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Original answer is A.
When the DHCP role is installed, it appears that the firewall rules are automatically added. This means you
only need to add the DHCP Manager MMC snap-in which is a Role Administration Tool feature.
So the correct answer must be B.
QUESTION 132
Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 is
a DHCP server that is configured to have a scope named Scope1. Server2 is configured to obtain an IP
address automatically. In Scope1, you create a reservation named Res_Server2 for Server2.
A technician replaces the network adapter on Server2.
You need to ensure that Server2 can obtain the same IP address.
What should you modify on Server1?
A.
B.
C.
D.

The Advanced settings of Res_Server2


The MAC address of Res Server2
The Network Access Protection Settings of Scope1
The Name Protection settings of Scope1

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
For clients that require a constant IP address, you can either manually configure a static IP address, or
assigna reservation on the DHCP server. Reservations are permanent lease assignments that are used to
ensure that a specified client on a subnet canalways use the same IP address. You can use DHCP
reservations for hosts that require a consistent IP address, but do not need to be staticallyconfigured. DHCP
reservations provide a mechanism by which IP addresses may be permanently assigned to aspecific client
based on the MAC address of that client. The MAC address of a Windows client can be found running the
ipconfig /all command. For Linux systems thecorresponding command is ifconfig -a.
Once the MAC address has been identified, the reservation may be configured using either the DHCP
consoleor at the command prompt using the netsh tool.

http://technet.microsoft.com/en-us/library/cc779507%28v=ws.10%29.aspx http://support.microsoft.com/
kb/170062/en-us
QUESTION 133
Your network contains an Active Directory domain named contoso.com. An organizational unit (OU) named
OU1 contains the user accounts and the computer accounts for laptops and desktop computers. A Group
Policy object (GPO) named GP1 is linked to OU1. You need to ensure that the configuration settings in GP1
are applied only to the laptops in OU1. The solution must ensure that GP1 is applied automatically to new
laptops that are added to OU1.
What should you do?
A.
B.
C.
D.

Modify the GPO Status of GP1.


Configure the WMI Filter of GP1.
Modify the security settings of GP1.
Modify the security settings of OU1.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
WMI filtering
Windows Management Instrumentation (WMI) filters allow you to dynamically determine the scope of
GroupPolicy objects (GPOs) based on attributes of the target computer. When a GPO that is linked to a WMI
filter isApplied on the target computer, the filter is evaluated on the target computer. If the WMI filter evaluates

tofalse, the GPO is not Applied (except if the client computer is running
Get Latest & Actual 70-410 Exam's Question and Answers from Passleader.
Windows Server, in which case the filteris ignored and the GPO is always Applied). If the WMI filter evaluates
to true, the GPO is Applied.
Reference: WMI filtering using GPMC
Windows Management Instrumentation (WMI) filters allow you to dynamically determine the scope of
GroupPolicy objects (GPOs) based on attributes of the target computer. When a GPO that is linked to a WMI
filter isApplied on the target computer, the filter is evaluated on the target computer. If the WMI filter evaluates
to false, the GPO is not Applied (except if the client computer is running WindowsServer, in which case the
filter is ignored and the GPO is always Applied). If the WMI filter evaluates to true, theGPO is Applied. WMI
filters, like GPOs, are stored on a per-domain basis. A WMI filter and the GPO it is linkedto must be in the
same domain. Select * from Win32_PhysicalMemory where FormFactor = 12 http://technet.microsoft.com/enus/library/cc779036%28v=ws.10%29.aspx
QUESTION 134
Your network contains an Active Directory domain named contoso.com. All client computer accounts are in an
organizational unit (OU) named AllComputers.
Client computers run either Windows 7 or Windows 8.
You create a Group Policy object (GPO) named GP1.
You link GP1 to the AllComputers OU.
You need to ensure that GP1 applies only to computers that have more than 8 GB of memory.
What should you configure?
A.
B.
C.
D.

The Security settings of AllComputers


The Security settings of GP1
The WMI filter for GP1
The Block Inheritance option for AllComputers

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Windows Management Instrumentation (WMI) filters allow you to dynamically determine the scope of Group
Policy objects (GPOs) based on attributes of the target computer. When a GPO that is linked to a WMI filter is
applied on the target computer, the filter is evaluated on the target computer. If the WMI filter evaluates to
false, the GPO is not applied (except if the client computer is running Windows Server, in which case the filter
is ignored and the GPO is always applied). If the WMI filter evaluates to true, the GPO is applied. WMI filters,
like GPOs, are stored on a per-domain basis. A WMI filter and the GPO it is linked to must be in the same
domain.
Get Latest & Actual 70-410 Exam's Question and Answers from Passleader.

SELECT Total Physical Memory FROM Win32_ComputerSystem WHERE TotalPhysicalMemory >=


8000000000
QUESTION 135
Your network contains an Active Directory domain named contoso.com. The domain contains two servers
named Server1 and Server2. Server1 runs Windows Server 2012 R2. Server2 runs Windows Server 2008 R2
Service Pack 1 (SP1) and has the DHCP Server server role installed.
You need to manage DHCP on Server2 by using the DHCP console on Server1.
What should you do first?
A.
B.
C.
D.

From Windows Firewall with Advanced Security on Server2, create an inbound rule.
From Internet Explorer on Server2, download and install Windows Management Framework 3.0.
From Server Manager on Server1, install a feature.
From Windows PowerShell on Server2, run Enable PSRemoting.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
QUESTION 136
Your network contains an Active Directory domain named contoso.com. The domain contains a member
server named HVServer1. HVServer1 runs Windows Server 2012 and has the Hyper-V
server role installed. HVServer1 hosts 10 virtual machines. All of the virtual machines connect to a virtual
switch named Switch1. Switch1 is configured as a private network. All of the virtual machines have the DHCP
guard and the router guard settings enabled. You install the DHCP server role on a virtual machine named
Server 1.
You authorize Server1 as a DHCP server in contoso.com.
You create an IP scope.
You discover that the virtual machines connected to Switch1 do not receive IP settings from Server1. You
need to ensure that the virtual machines can use Server1 as a DHCP server.
What should you do?
A.
B.
C.
D.

Enable MAC address spoofing on Server1.


Disable the DHCP guard on all of the virtual machines that are DHCP clients.
Disable the DHCP guard on Server1.
Enable single-root I/O virtualization (SR-IOV) on Server1.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Private virtual networks are used where you want to allow communications between virtual machine to virtual
machine on the same physical server In a block diagram, a private network is an internal network without a
virtual NIC in the parentpartition. A private network would commonly be used where you need complete
isolation of virtual machines from external and parent partition traffic. DMZ workloads running on a leg of a trihomed firewall, or an isolated test domain are examples where this type of network may be useful.

DHCP Guard is a feature that you can use (as the owner of the hypervisor) to prevent VMs that you do not
authorize from acting as DHCP Servers. Unauthorized and Authorized is a procedural / process phrase. It is
not a technical phrase or any setting that can be applied. It is the business decision to call machine authorized
or not. DHCP Guard is specific to the port / vNIC of a VM. And the setting moves with the VM / vNIC.
DHCPGuard allows you to specify whether DHCP server messages coming from a VM should be dropped. For
VMs that are running an authorized instance of the DHCP server role, you can turn
DHCPGuard off by using the following cmdlet:
Set-VMNetworkAdapter - VMName MyDhcpServer1 - DhcpGuard Off For all other VMs that are not authorized
DHCP servers, you can prevent them from becoming a rogue
DHCP server by turning DHCPGuard on, using the following cmdlet.
Set-VMNetworkAdapter - VMName CustomerVM - DhcpGuard On
http://technet.microsoft.com/en-us/library/jj679878.aspx#bkmk_dhcp http://blogs.technet.com/b/jhoward/
archive/2008/06/17/hyper-v-what-are-the-uses-for-different- types-of- virtual-networks.aspx
QUESTION 137
You work as a senior administrator at L2P.com. The L2P.com network consists of a single domain named
L2P.com. All servers on the L2P.com network have Windows Server 2012 R2 installed. You are running a
training exercise for junior administrators. You are currently discussing the new VHD format called VHDX.
Which of the following is TRUE with regards to VHDX? (Choose all that apply.)
A.
B.
C.
D.

It supports virtual hard disk storage capacity of up to 64 GB.


It supports virtual hard disk storage capacity of up to 64 TB.
It does not provide protection against data corruption during power failures.
It has the ability to store custom metadata about the file that the user might want to record.

Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:

The main new features of the VHDX format are:


Support for virtual hard disk storage capacity of up to 64 TB. Protection against data corruption during power
failures by logging updates to the VHDX metadata structures. Improved alignment of the virtual hard disk
format to work well on large sector disks.
The VHDX format also provides the following features:
Larger block sizes for dynamic and differencing disks, which allows these disks to attune to the needs of the
workload.
A 4-KB logical sector virtual disk that allows for increased performance when used by applications and
workloads that are designed for 4-KB sectors.
The ability to store custom metadata about the file that the user might want to record, such as
operating system version or patches applied.
Efficiency in representing data (also known as "trim"), which results in smaller file size and allows the
underlying physical storage device to reclaim unused space. (Trim requires physical disks directly attached to
a virtual machine or SCSI disks, and trim-compatible hardware.) VHDX Format - Features and Benefits
VHDX format features provide features at the virtual hard disk as well as virtual hard disk file layers and is
optimized to work well with modern storage hardware configurations and capabilities. At the virtual hard disk
layer, benefits include the ability to represent a large virtual disk size up to 64 TB, support larger logical sector
sizes for a virtual disk up to 4 KB that facilitates the conversion of 4 KB sector physical disks to virtual disks,
and support large block sizes for a virtual disk up to 256 MB that enables tuning block size to match the IO
patterns of the application or system for optimal performance. At the virtual hard disk file layer, the benefits
include the use of a log to ensure resiliency of the VHDX file to corruptions from system power failure events
and a mechanism that allows for small pieces of user generated data to be transported along with the VHDX
file. On modern storage platforms, the benefits include optimal performance on host disks that have physical
sector sizes larger than 512 bytes through improved data alignment and capability to use the information from
the UNMAP command, sent by the application or system using the virtual hard disk, to optimize the size of the
VHDX file. The format is designed so that additional features could be introduced in the future by Microsoft or
extended by other parser implementations. The format provides parsers the ability to detect features in a
VHDX file that a parser does not understand. http://technet.microsoft.com/en-us/library/hh831446.aspx http://
www.microsoft.com/en-us/download/details.aspx?id=34750
QUESTION 138
You have a server named Server1 that runs a Server Core Installation of Windows Server 2012 R2. You attach
a 4-TB disk to Server1. The disk is configured as an MBR disk. You need to ensure that you can create a 4-TB
volume on the disk.
Which Diskpart command should you use?
A.
B.
C.
D.

Automount
Convert
Expand
Attach

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
You can use Diskpart to convert a basic disk to a dynamic disk. The basic disk can either be empty or
containeither primary partitions or logical drives. The basic disk can be a data disk or system or boot drive. A
MBR file structure is only capable of 2TB maximum. The disk will have to be converted to a GPT filestructure.
GPT is capable of 18 exabytes volumes. Convert gpt - Converts an empty basic disk with the master boot
record (MBR) partition style into a basic diskwith the GUID partition table (GPT) partition style. The disk may
be a basic or a dynamic disk but it must not contain any valid data partitions or volumes.

http://technet.microsoft.com/en-us/library/cc766465(v=ws.10).aspx
http://support.microsoft.com/kb/300415/en-us
QUESTION 139
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1. Server1 runs Windows Server 2012 R2. You need to create 3-TB virtual hard disk (VHD) on Server1.
Which tool should you use?
A.
B.
C.
D.

Server Manager
Diskpart
New-StoragePool
New-VirtualDisk

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
New-VirtualDisk - Creates a new virtual disk in the specified storage pool. Although the new Server Manager
UI in Windows Server 2012 R2 provides a very convenient and intuitive workflow to provision and manage
Storage, interaction with PowerShell is required to access many of the advanced features.
If I then create a simple 200GB Virtual Disk via the UI named VDiskSimpleUI, the resulting Virtual Disk
leverages 8 columns and maintains 1 copy of the data. But when creating the Virtual Disk via PowerShell,
I can force the tripping across all nine of the disks and optimize performance. New-VirtualDisk StoragePoolFriendlyName Pool01 - ResiliencySettingName Simple - Size 200GB
- FriendlyName VDiskSimplePS - ProvisioningType Fixed - NumberOfDataCopies 1
- NumberOfColumns 9
And creating a mirrored 200GB Virtual Disk via the UI named VDiskMirrorUI produces a Virtual Disk with 4
columns and 2 data copies. But with PowerShell, I can create a slightly different configuration, increasing the
data protection (and also the disk footprint):
New-VirtualDisk -StoragePoolFriendlyName Pool01 -ResiliencySettingName Mirror -Size 200GB FriendlyName VDiskMirrorPS -ProvisioningType Fixed -NumberOfDataCopies 3 -NumberOfColumns 3
http://blogs.technet.com/b/wincat/archive/2012/05/21/optimizing-windows-server-2012- storagemanagementvia-powershell-for-both-performance-and-resiliency.aspx http://technet.microsoft.com/en-us/library/hh848643%
28v=wps.620%29.aspx

QUESTION 140
Your network contains an Active Directory domain named contoso.com.
All domain controllers run Windows Server 2012 R2.
You create and enforce the default AppLocker executable rules. Users report that they can no longer execute
a legacy application installed in the root of drive C. You need to ensure that the users can execute the legacy
application.
What should you do?
A.
B.
C.
D.

Modify the action of the existing rules.


Create a new rule.
Add an exception to the existing rules.
Delete an existing rule.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
AppLocker is a feature that advances the functionality of the Software Restriction Policies feature. AppLocker
contains new capabilities and extensions that reduce administrative overhead and help
administrators control how users can access and use files, such as executable files, scripts, Windows Installer
files, and DLLs. By using AppLocker, you can:
Define rules based on file attributes that persist across application updates, such as the publisher name
(derived from the digital signature), product name, file name, and file version. You can also create rules based
on the file path and hash.
Assign a rule to a security group or an individual user. Create exceptions to rules. For example, you can create
a rule that allows all users to run all Windows binaries except the Registry Editor (Regedit.exe). Use audit-only
mode to deploy the policy and understand its impact before enforcing it. . Create rules on a staging server, test
them, export them to your production environment, and then import them into a Group Policy Object.
Simplify creating and managing AppLocker rules by using Windows PowerShell cmdlets for AppLocker.
AppLocker default rules
AppLocker allows you to generate default rules for each of the rule types.
Executable default rule types:
Allow members of the local Administrators group to run all applications. Allow members of the Everyone group
to run applications that are located in the Windows folder. Allow members of the Everyone group to run
applications that are located in the Program Filesfolder. Windows Installer default rule types:
Allow members of the local Administrators group to run all Windows Installer files. Allow members of the
Everyone group to run digitally signed Windows Installer files. Allow members of the Everyone group to run all
Windows Installer files located in the Windows\Installer folder. Script default rule types:
Allow members of the local Administrators group to run all scripts. Allow members of the Everyone group to
run scripts located in the Program Files folder. Allow members of the Everyone group to run scripts located in
the Windows folder. DLL default rule types:( this on can affect system performance ) Allow members of the
local Administrators group to run all DLLs. Allow members of the Everyone group to run DLLs located in the
Program Files folder. Allow members of the Everyone group to run DLLs located in the Windows folder. You
can apply AppLocker rules to individual users or to a group of users. If you apply a rule to a group of users, all
users in that group are affected by that rule. If you need to allow a subset of a user group to use an application,
you can create a special rule for that subset. For example, the rule "Allow Everyone to run Windows except
Registry Editor" allows everyone in the organization to run the Windows operating system, but it does not allow
anyone to run Registry Editor.
The effect of this rule would prevent users such as Help Desk personnel from running a program that is
necessary for their support tasks. To resolve this problem, create a second rule that applies to the Help Desk
user group: "Allow Help Desk to run Registry Editor." If you create a deny rule that does not allow any users to
run Registry Editor, the deny rule will override the second rule that allows the Help Desk user group to run
Registry Editor.
http://technet.microsoft.com/library/hh831440.aspx

http://technet.microsoft.com/en-us/library/dd759068.aspx http://technet.microsoft.com/de-de/library/
hh994621.aspx
QUESTION 141
You have two servers named Server! and Server2. Both servers run Windows Server 2012 R2. The servers
are configured as shown in the following table.

The routing table for Server1 is shown in the Routing Table exhibit. (Click the Exhibit button.)

From Server1, you attempt to ping Server2, but you receive an error message as shown in the Error exhibit.
(Click the Exhibit button.)

You need to ensure that you can successfully ping Server2 from Server1.
What should you do on Server1?

A.
B.
C.
D.

Disable Windows Firewall.


Modify the default gateway settings.
Modify the DNS settings.
Modify the subnet mask.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Route is used to view and modify the IP routing table.
Route Print displays a list of current routes that the host knows. Default gateways are important to make IP
routing work efficiently. TCP/IP hosts rely on default gateways for most of their communication needs with
hosts on remote networksegments. In this way, individual hosts are freed of the burden of having to maintain
extensive andcontinuously updated knowledge about individual remote IP network segments. Only the router
that acts as thedefault gateway needs to maintain this level of routing knowledge to reach other remote
network segments inthe larger internetwork. In order for Host A on Network 1 to communicate with Host B on
Network 2, Host A first checks its routing tableto see if a specific route to Host B exists. If there is no specific
route to Host B, Host A forwards its TCP/IPtraffic for Host B to its own default gateway, IP Router 1.

http://technet.microsoft.com/en-us/library/cc779696%28v=ws.10%29.aspx http://technet.microsoft.com/en-us/
library/cc958877.aspx

QUESTION 142
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. The domain
contains a virtual machine named VM1.
A developer wants to attach a debugger to VM1.
You need to ensure that the developer can connect to VM1 by using a named pipe.
Which virtual machine setting should you configure?
A.
B.
C.
D.

Network Adapter
BIOS
Processor
COM 1

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Named pipe. This option connects the virtual serial port to a Windows named pipe on the host operatingsystem
or a computer on the network. A named pipe is a portion of memory that can be used by one processto pass
information to another process, so that the output of one is the input of the other. The second processcan be
local (on the same computer as the first) or remote (on a networked computer). For example, a localnamed
pipe path could be \\.\pipe\mypipename. Named
pipes can be used to create a virtual null modem cable between two virtual machines, or between avirtual
machine and a debugging program on the host operating system that supports the use of named pipes.
By connecting two virtual serial ports to the same named pipe, you can create a virtual null modem
cableconnection. Named pipes are useful for debugging or for any program that requires a null modem
connection.

http://technet.microsoft.com/en-us/library/ee449417(v=ws.10).aspx http://blogs.msdn.com/b/ntdebugging/
archive/2011/12/30/configuring-a-hyper-v-vm-forkernel- debugging.aspx
QUESTION 143
Your network contains an Active Directory domain named contoso.com.
Your company hires 500
temporary employees for the summer. The human resources department gives you a Microsoft Excel
document that contains a list of the temporary employees. You need to automate the creation of user accounts
for the 500 temporary employees.
Which tool should you use?
A.
B.
C.
D.

The Add-Member cmdlet


ADSI Edit
The csvde.exe command
Active Directory Users and Computers

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Csvde.exe is the best option to add multiple users. as you just need to export the excel spreadsheet as a
csvfile and make sure the parameters are correct.
You can use Csvde to import and export Active Directory data that uses the commaseparated valueformat.

Use a spreadsheet program such as Microsoft Excel to open this .csv file and view the header andvalue
information.

http://support.microsoft.com/kb/327620/en-us
QUESTION 144
Your network contains two subnets. The subnets are configured as shown in the following table.

You have a server named Server2 that runs Windows Server 2012 R2. Server2 is connected to LAN1.
You run the route print command as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that Server2 can communicate with the client computers on LAN2.
What should you do?
A.
B.
C.
D.

Change the metric of the 10.10.1.0 route.


Set the state of the Teredo interface to disable.
Set the state of the Microsoft ISATAP Adapter #2 interface to disable.
Run route delete 172.23.2.0.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Route is used to view and modify the IP routing table.

Route Print displays a list of current routes that the host knows. Default gateways are important to make IP
routing work efficiently. TCP/IP hosts rely on default gateways for most of their communication needs with
hosts on remote network segments. In this way, individual hosts are freed of the burden of having to maintain
extensive and continuously updated knowledge about individual remote IP network segments. Only the router
that acts as the default gateway needs to maintain this level of routing knowledge to
reach other remote network segments in the larger internetwork. If the default gateway fails, communication
beyond the local network segment may be impaired. To prevent this, you can use the Advanced TCP/IP
Settings dialog box (in Network Connections) for each connection to specify multiple default gateways. You
can also use the route command to manually add routes to the routing table for heavily used hosts or
networks. If you have multiple interfaces and you configure a default gateway for each interface, TCP/IP by
default automatically calculates an interface metric that is based on the speed of the interface. The interface
metric becomes the metric of the default route in the routing table for the configured default gateway. The
interface with the highest speed has the lowest metric for its default route. The result is that whenever multiple
default gateways are configured on multiple interfaces, the fastest interface will be used to forward traffic to its
default gateway. If multiple interfaces of the same speed have the same lowest interface metric, then, based
upon the binding order, the default gateway of the first network adapter is used. The default gateway for the
second network adapter is used when the first is unavailable. In order for Host A on Network 1 to communicate
with Host B on Network 2, Host A first checks its routing table to see if a specific route to Host B exists. If there
is no specific route to Host B, Host A forwards its TCP/IP traffic for Host B to its own default gateway, IP
Router 1.

http://technet.microsoft.com/en-us/library/cc779696%28v=ws.10%29.aspx http://technet.microsoft.com/en-us/
library/cc958877.aspx http://support.microsoft.com/kb/299540/en-us
QUESTION 145
Your network contains an Active Directory domain named contoso.com.
The domain contains a server named Server1.
Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. You need to log the amount
of system resources used by each virtual machine.
What should you do?
A.
B.
C.
D.

From Windows PowerShell, run the Enable-VMRe5ourceMetering cmdlet.


From Windows System Resource Manager, enable Accounting.
From Windows System Resource Manager, add a resource allocation policy.
From Windows PowerShell, run the Measure-VM cmdlet.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Route is used to view and modify the IP routing table.
Route Print displays a list of current routes that the host knows. Default gateways are important to make IP

routing work efficiently. TCP/IP hosts rely on default gateways for most of their communication needs with
hosts on remote networksegments. In this way, individual hosts are freed of the burden of having to maintain
extensive andcontinuously updated knowledge about individual remote IP network segments. Only the router
that acts as thedefault gateway needs to maintain this level of routing knowledge to reach other remote
network segments inthe larger internetwork. If the default gateway fails, communication beyond the local
network segment may
be impaired. To preventthis, you can use the Advanced TCP/IP Settings dialog box (in Network Connections)
for each connection tospecify multiple default gateways. You can also use the route command to manually add
routes to therouting table for heavily used hosts or networksIf you have multiple interfaces and you configure a
default gateway for each interface, TCP/IP by defaultautomatically calculates an interface metric that is based
on the speed of the interface. The interface metricbecomes the metric of the default route in the routing table
for the configured default gateway. The interfacewith the highest speed has the lowest metric for its default
route. The result is that whenever multiple defaultgateways are configured on multiple interfaces, the fastest
interface will be used to forward traffic to its defaultgateway. If multiple interfaces of the same speed have the
same lowest interface metric, then, based upon the bindingorder, the default gateway of the first network
adapter is used. The default gateway for the second networkadapter is used when the first is unavailable. In
order for Host A on Network 1 to communicate with Host B on Network 2, Host A first checks its routing tableto
see if a specific route to Host B exists. If there is no specific route to Host B, Host A forwards its TCP/IPtraffic
for Host B to its own default gateway, IP Router 1.

http://technet.microsoft.com/en-us/library/cc779696%28v=ws.10%29.aspx http://technet.microsoft.com/en-us/
library/cc958877.aspx http://support.microsoft.com/kb/299540/en-us
QUESTION 146
You have a server named Server1 that runs Windows Server 2012 R2.
You plan to create an image of Server1.
You need to remove the source files for all server roles that are not installed on Server1.
Which tool should you use?
A.
B.
C.
D.

servermanagercmd.exe
imagex.exe
dism.exe
ocsetup.exe

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
servermanagercmd.exe - The ServerManagerCmd.exe command-line tool has been deprecated in
WindowsServer 2008 R2. imagex.exe - ImageX is a command-line tool in Windows Vista that you can use to
create and manageWindows image (.wim) files. A .wim file contains one or more volume images, disk volumes
that containimages of an installed Windows operating system. dism.exe - Deployment Image Servicing and

Management (DISM.exe) is a command-line tool that canbe used to service a Windows image or to prepare a
Windows Preinstallation Environment (WindowsPE) image. It replaces Package Manager (Pkgmgr.exe),
PEimg, and Intlcfg that were included in Windows Vista
The functionality that was included in these tools is now consolidated in one tool(DISM.exe), and
new functionality has been added to improve the experience for offline servicing. DISMcan Add, remove, and
enumerate packages. ocsetup.exe - The Ocsetup.exe tool is used as a wrapper for Package Manager
(Pkgmgr.exe) and for WindowsInstaller (Msiexec.exe). Ocsetup.exe is a command-line utility that can be used
to perform scripted installs andscripted uninstalls of Windows optional components. The Ocsetup.exe tool
replaces the Sysocmgr.exe tool thatWindows XP and Windows Server 2003i use.

http://technet.microsoft.com/en-us/library/hh824822.aspx http://blogs.technet.com/b/joscon/
archive/2010/08/26/adding-features-with-dism.aspx http://technet.microsoft.com/en-us/library/hh831809.aspx
http://technet.microsoft.com/en-us/library/hh825265.aspx
QUESTION 147
Your network contains an Active Directory domain named contoso.com. An administrator provides you with a
file that contains the information to create user accounts for 200 temporary employees. The file is shown in the
exhibit. (Click the Exhibit button.)

You need to automate the creation of the user accounts.


You must achieve this goal by using the minimum amount of administrative effort.
Which tool should you use?
A.
B.
C.
D.

csvde
Net user
Ldifde
Dsadd

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
csvde - Imports and exports data from Active Directory Domain Services (AD DS) using files thatstore data in
the comma-separated value (CSV) format. You can also support batch operations based on the CSV file

format standard. http://technet.microsoft.com/en-us/library/cc732101(v=ws.10).aspx Net user - Adds or


modifies user accounts, or displays user account information. http:// technet.microsoft.com/en-us/library/
cc771865(v=ws.10).aspx Ldifde - Creates, modifies, and deletes directory objects. You can also use ldifde to
extend the
schema, export Active Directory user and group information to other applications or services, and populate
Active Directory Domain Services (AD DS) with data from other directory services. http://
technet.microsoft.com/ en-us/library/cc731033(v=ws.10).aspx Dsadd - Adds specific types of objects to the
directory. http://technet.microsoft.com/en-us/library/cc753708 (v=ws.10).aspx csvde.exe is the best option to
add multiple users. as you just need to export the excel spreadsheet as a csv file and make sure the
parameters are correct.
You can use Csvde to import and export Active Directory data that uses the comma-separated value format.
Use a spreadsheet program such as Microsoft Excel to open this .csv file and view the header and value
information

http://support.microsoft.com/kb/327620/en-us
QUESTION 148
You have a print server named Server1 that runs Windows Server 2012 R2. You discover that when there are
many pending print jobs, the system drive occasionally runs out of free space.
You add a new hard disk to Server1.
You create a new NTFS volume.
You need to prevent the print jobs from consuming disk space on the system volume.
What should you modify?
A.
B.
C.
D.

the properties of the Print Spooler service


the Print Server Properties
the properties of each shared printer
the properties on the new volume

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Windows spools print jobs by default to the following directory as the they are processed:
%SystemRoot%\SYSTEM32\SPOOL\PRINTERS.
It is possible for the administrator of a Windows print server to manually instruct Windows the location
forplacing the spool files, if for example there is a concern for disk space.

http://support.microsoft.com/kb/137503/en-us
http://technet.microsoft.com/en-us/library/cc757764%28v=ws.10%29.aspx http://technet.microsoft.com/en-us/
library/cc736979%28v=ws.10%29.aspx
QUESTION 149
Your network contains an Active Directory domain named contoso.com. The domain contains an application
server named Server1. Server1 runs Windows Server 2012 R2. You have a client application named App1 that
communicates to Server1 by using dynamic TCP ports. On Server1, a technician runs the following command:
New-NetFirewallRule -DisplayName AllowDynamic -Direction Outbound - LocalPort 1024- 65535 -Protocol
TCP
Users report that they can no longer connect to Server1 by using Appl.
You need to ensure that App1 can connect to Server1.
What should you run on Server1?
A.
B.
C.
D.

Set-NetFirewallRule -DisplayName AllowDynamic -Action Allow


netsh advfirewall firewall set rule name=allowdynamic new action = allow
Set-NetFirewallRule -DisplayName AllowDynamic -Direction Inbound
netsh advfirewall firewall add rule name=allowdynamic action=allow

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Set-NetFirewallRule - Modifies existing firewall rules.

You have to allow the connection INTO the server - inbound rules

http://technet.microsoft.com/en-us/library/jj573828%28v=wps.620%29.aspx
http://mikefrobbins.com/2013/02/28/use-powershell-to-remotely-enable-firewall-exceptionson- windows-server2012/
QUESTION 150
You have a server named dc2.contoso.com that runs Windows Server 2012 R2 and has the DNS Server
server role installed.
You open DNS Manager as shown in the exhibit. (Click the Exhibit button.)

You need to view the DNS server cache from DNS Manager.
What should you do first?
A.
B.
C.
D.

From the View menu, click Advanced.


From the Action menu, click Configure a DNS Server...
From the View menu, click Filter...
From the Action menu, click Properties.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
To view the contents of the DNS cache, perform the following steps:
1. Start the Microsoft Management Console (MMC) DNS snap-in (Go to Start, Programs, Administrative
Tools,and click DNS).
2. From the View menu, select Advanced.
3. Select the Cached Lookups tree node from the left-hand pane to display the top-level domains (e.g., com,
net) under.(root). Expand any of these domains to view the cached DNS information (the actual records
willappear in the right-hand pane).

QUESTION 151
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers on the L2P.com network have Windows Server 2012 R2 installed. L2P.com has a server, named
L2P-SR07, which has two physical disks installed. The C: drive hosts the boot partition, while the D: drive is
not being used. Both disks are online. You have received instructions to create a virtual machine on L2PSR07.
Subsequent to creating the virtual machine, you have to connect the D: drive to the virtual machine. Which of
the following is TRUE with regards to connecting a physical disk to a virtual machine?

A.
B.
C.
D.

The physical disk should not be online.


The physical disk should be uninstalled and re-installed.
The physical disk should be configured as a striped disk.
The physical disk should be configured as a mirrored disk.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Your virtual machines can also be connected to physical hard disks on the virtualization server virtual hard
disks. (This is sometimes referred to as having a "pass-through" disk connected to a virtual machine.)
The physical hard disk that you connect to a virtual machine can also be a network-attached disk, like a logical
unit number (LUN) in a storage area network (SAN). A common example is an iSCSI LUN that has been
mapped to the virtualization server by using Microsoft iSCSI Initiator. Because the virtualization server sees
network-attached storage as local disks, the iSCSI LUN can be connected to a virtual machine.
The most important limitation about having a physical hard disk connected to a virtual machine is that it cannot
be connected to the virtualization server or to other virtual machines at the same time. The virtual machine
must have exclusive access to the physical hard disk.
Pass-through Disk Configuration
Hyper-V allows virtual machines to access storage mapped directly to the Hyper-V server without requiring the
volume be configured. The storage can either be a physical disk internal to the Hyper- V server or it can be a
Storage Area Network (SAN) Logical Unit (LUN) mapped to the Hyper-V server. To ensure the Guest has
exclusive access to the storage, it must be placed in an Offline state from the Hyper-Vserver perspective
http://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks-in-hyper- v.aspx
http://technet.microsoft.com/pt-pt/library/ff404147%28v=ws.10%29.aspx
QUESTION 152
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1 that runs Windows Server 2012 R2. You create a new inbound rule by using Windows Firewall with
Advanced Security. You need to configure the rule to allow Server1 to accept unsolicited inbound packets that
are received through a network address translation (NAT) device on the network.
Which setting in the rule should you configure?
A.
B.
C.
D.

Edge traversal
Authorized computers
Interface types
Remote IP address

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Edge traversal - This indicates whether edge traversal is enabled (Yes) or disabled (No). When edge traversal
is enabled, the application, service, or port to which the rule applies is globally addressable and accessible
from outside a network address translation (NAT) or edge device.

Select one of the following options from the list: Block edge traversal (default) - Prevent applications from
receiving unsolicited traffic from the Internet through a NAT edge device. Allow edge traversal -Allow
applications to receive unsolicited traffic directly from the Internetthrough a NAT edge device. Defer to user Let the user decide whether to allow unsolicited traffic from the Internet through a NAT edge device when an
application requests it. Defer to application - Let each application determine whether to allow unsolicited traffic
from the Internet through a NAT edge device. http://technet.microsoft.com/en-us/library/cc731927.aspx http://
technet.microsoft.com/en-us/library/dd421713%28v=ws.10%29.aspx
QUESTION 153
Your network contains an Active Directory domain named contoso.com. The domain contains a member
server named Server1. Server1 runs Windows Server 2012 R2 and has the File Server server role installed.
On Server1, you create a share named Documents. You need to ensure that users can recover files that they
accidently delete from Documents.
What should you do?

A. Enable shadow copies by using Computer Management.


B. Modify the Startup type of the Volume Shadow Copy Service (VSS) by using the Services console.
C. Create a recovery partition by using Windows Assessment and Deployment Kit (Windows ADK).

D. Create a storage pool that contains a two-way mirrored volume by using Server Manager.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
If you enable Shadow Copies of Shared Folders on a volume using the default values, a task will be
scheduledto create shadow copies at 7:00 A.M of next business day. The default storage area will be on the
samevolume, and its size will be 10 percent of the available space. You can only enable Shadow Copies of
Shared Folders on a per-volume basis--that is, you cannot selectspecific shared folders and files on a volume
to be copied or not copied. To enable and configure Shadow Copies of Shared Folders
1. Click Start, point to Administrative Tools, and then click Computer Management.
2. In the console tree, right-click Shared Folders, click All Tasks, and then click Configure Shadow Copies.
3. In Select a volume, click the volume that you want to enable Shadow Copies of Shared Folders for, and then
click Enable.
4. You will see an alert that Windows will create a shadow copy now with the current settings and that
thesettings might not be appropriate for servers with high I/O loads. Click Yes if you want to continue or No if
youwant to select a different volume or settings.
5. To make changes to the default schedule and storage area, click Settings.

http://technet.microsoft.com/en-us/library/cc771893.aspx
QUESTION 154
You have a server named Server1 that runs a Server Core installation of Windows Server 2012 R2. Server1 is
configured to obtain an IPv4 address by using DHCP. You need to configure the IPv4 settings of the network
connection on Server1 as follows:
- IP address: 10.1.1.1
- Subnet mask: 255.255.240.0
- Default gateway: 10.1.1.254
What should you run?
A.
B.
C.
D.

netsh.exe
netcfg.exe
msconfig.exe
ipconfig.exe

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
In order to configure TCP/IP settings such as the IP address, Subnet Mask, Default Gateway, DNS and WINS
addresses and many other options you can use Netsh.exe.
Incorrect:
not D: Windows Server 2012 Core still has IPCONFIG.EXE that can be used to view the IP configuration.
Modern servers typically come with several network interface ports. This causes IPCONFIG.EXE to scroll off
the screen when viewing its output. Consider piping the output if IPCONFIG.EXE to a file and view it with
Notepad.exe.
QUESTION 155
Your network contains an Active Directory domain named contoso.com. The domain contains three member
servers. The servers are configured as shown in the following table.

All client computers run Windows 8. All client computers receive updates from Server2. On Servers, you add a
shared printer named Printer1. Printer1 uses a Type 4 driver that is not included in the Windows 8 installation
media.
You need to ensure that when users connect to the printer for the first time, the printer driver is installed
automatically on their client computer.
What should you do?
A.
B.
C.
D.

From the Windows Deployment Services console on Server1, add the driver package for Printer1.
From the Update Services console on Server2, import and approve updates.
From Windows PowerShell on Server3, run the Add-PrinterDriver cmdlet.
From the Print Management console on Server3, add additional drivers for Printer1.

Correct Answer: D

Section: (none)
Explanation
Explanation/Reference:
Explanation:
Print and Document Services enables you to centralize print server and network printer tasks. With this role,
you can also receive scanned documents from network scanners and route the documents to a shared
network resource, Windows SharePoint Services site, or email addresses. Starting with Windows 8 and Server
2012 R2 - here comes the Version 4 drivers (class driver or model specific driver) which changes a couple of
things, a system that allows people to install their printers without having to locate a driver for that device, in
many cases.
1. There is no v3 driver support for Windows on ARM
2. The print server is no longer a software distribution mechanism
3. Group Policy Preference TCP/IP printers do not support Type 4 print drivers
4. The LPR/LPD protocol is deprecated and will eventually be removed To install v4 drivers using the Print
Management Console
1. Open the Print Management Console by opening Server Manager, click Tools, and then click Print
Management.
2. Expand Print Servers, and then expand the Print Server name. Right click Drivers and select Add Drivers.
3. To add a v4 driver for a device, select the driver that has v4 or Class Driver in the name.

Once installed, v4 drivers are identified by the Version field displayed in the Driver Properties:

The driver name will state Class Driver, the Config File should show PrintConfig.dll, and the driver path should
be %systemroot%\system32\DriverStore.
Class Drivers - V4 drivers that ship with Windows Server 2012 R2 are known as Class Drivers. Drivers of this
type should always display Class Driver in the name. Model Specific Drivers - V4 drivers that are downloaded
directly from a printer manufacturer website or downloaded from Windows Update are known as model
specific drivers. The following Windows PowerShell cmdlet or cmdlets perform the same function as the
preceding procedure. Enter each cmdlet on a single line, even though they may appear word-wrapped across
several lines here Name "HP Color LaserJet 5550 PS Class Driver" because of formatting constraints. AddPrinterDriver http://technet.microsoft.com/en-us/library/hh831468.aspx http://technet.microsoft.com/en-us/library/
jj134163.aspx http://technet.microsoft.com/en-us/library/hh831769.aspx http://blogs.technet.com/b/askperf/
archive/2012/11/03/windows-8-windows-server-2012-what-s- new-with- printing-in-windows-8.aspx
QUESTION 156
Your network contains an Active Directory domain named contoso.com. The domain contains 20 computer
accounts in an organizational unit (OU) named OU1.
A user account named User1 is in an OU named OU2.
You are configuring a Group Policy object (GPO) named GPO1. You need to assign User1 the Back up files
and directories user right to all of the computer accounts in OU1.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
E.

Link GPO1 to OU1.


Link GPO1 to OU2.
Modify the Delegation settings of GPO1.
From User Configuration in GPO1, modify the security settings.
From Computer Configuration in GPO1, modify the security settings.

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:
Explanation:
A. You have to Link a GPO to an object in order for it to be Applied to that object B. Wrong object to link the
GPO
C. Delegation settings refer to delegating control over the properties of the GPO D. User Configuration typically
contains subitems for Software Settings, Windows Settings, and AdministrativeTemplates
E. Backup Files and Directories are found in Computer Configuration\Windows Settings\Local Policies\User
Rights Assignment Back up files and directories - This user right determines which users can bypass file and
directory, registry,and other persistent object permissions for the purposes of backing up the system.

Specifically, this user right is similar to granting the following permissions to the user or group in question on
allfiles and folders on the system:
Traverse Folder/Execute File
List Folder/Read Data
Read Attributes
Read Extended Attributes
Read Permissions

Caution: Assigning this user right can be a security risk. Since there is no way to be sure that a user is backing
up data, stealing data, or copying data to be distributed, only assign this user right to trusted users.
Default on workstations and servers: Administrators, Backup Operators. Default on domain
controllers:Administrators,Backup Operators,Server Operators http://www.microsoft.com/en-us/download/
details.aspx?id=25250
QUESTION 157
You have an existing Active Directory site named Site1.
You create a new Active Directory site and name it Site2. You need to configure Active Directory replication
between Site1 and Site2.
You install a new domain controller.
You create the site link between Site1 and Site2.
What should you do next?
A. Use the Active Directory Sites and Services console to configure a new site link bridge object.
B. Use the Active Directory Sites and Services console to decrease the site link cost between Site1 and Site2.
C. Use the Active Directory Sites and Services console to assign a new IP subnet to Site2. Move the new
domain controller object to Site2.
D. Use the Active Directory Sites and Services console to configure the new domain controller as a preferred
bridgehead server for Site1.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.enterprisenetworkingplanet.com/netsysm/article.php/624411/Intersite-Replication.htm Inter-site
Replication
The process of creating a custom site link has fivebasic steps:
1. Create the site link.
's associated attributes.
2. Configure the site link
3. Create site link bridges.
4. Configure connection objects. (This step is optional.)
5. Designate a preferred bridgehead server. (This step is optional) http://technet.microsoft.com/en-us/library/
cc759160%28v=ws.10%29.aspx Replication between sites
QUESTION 158
Your company has an Active Directory forest. Not all domain controllers in the forest are configured as Global
Catalog Servers. Your domain structure contains one root domain and one child domain. You modify the folder
permissions on a file server that is in the child domain. You discover that some Access Control entries start
with S-1-5-21 and that no account name is listed.
You need to list the account names. What should you do?
A.
B.
C.
D.

Move the RID master role in the child domain to a domain controller that holds the Global Catalog.
Modify the schema to enable replication of the friendlynames attribute to the Global Catalog.
Move the RID master role in the child domain to a domain controller that does not hold the Global Catalog.
Move the infrastructure master role in the child domain to a domain controller that does not hold the Global
Catalog.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:

If the IM Flexible Single Master Operation (FSMO) role holder is also a global catalog server, the phantom
indexes are never created or updated on that domain controller. (The FSMO is also known as the operations
master.) This behavior occurs because a global catalog server contains a partial replica of every object in
Active Directory. The IM does not store phantom versions of the foreign objects because it already has a
partial replica of the object in the local global catalog. For this process to work correctly in a multidomain
environment, the infrastructure FSMO role holder cannot be a global catalog server. Be aware that the first
domain in the forest holds all five FSMO roles and is also a global catalog. Therefore, you must transfer either
role to another computer as soon as another domain controller is installed in the domain if you plan to have
multiple domains.
QUESTION 159
Your company has an Active Directory domain.
You log on to the domain controller. The Active Directory Schema snap-in is not available in the Microsoft
Management Console (MMC).
You need to access the Active Directory Schema snap-in.
What should you do?
A. Register Schmmgmt.dll.
B. Log off and log on again by using an account that is a member of the Schema Admins group.
C. Use the Ntdsutil.exe command to connect to the schema master operations master and open the schema
for writing.
D. Add the Active Directory Lightweight Directory Services (AD/LDS) role to the domain controller by using
Server Manager.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Install the Active Directory Schema Snap-In
You can use this procedure to first register the dynamic-link library (DLL) that is required for the Active
Directory Schema snap-in.
You can then add the snap-in to Microsoft Management Console (MMC).
To install the Active Directory Schema snap-in
1. To open an elevated command prompt, click Start , type command prompt and then right-click Command
Prompt when it appears in the Start menu. Next, click Run as administrator and then click OK .
To open an elevated command prompt in Windows Server 2012 R2, click Start , type cmd , right clickcmd and
then click Run as administrator .
2. Type the following command, and then press ENTER:
regsvr32 schmmgmt.dll
3. Click Start , click Run , type mmc and then click OK .
4. On the File menu, click Add/Remove Snap-in .
5. Under Available snap-ins , click Active Directory Schema , click Add and then click OK .
6. To save this console, on the File menu, clickSave .
7. In the Save As dialog box, do one of the following:
* To place the snap-in in the Administrative Tools folder, in File name , type a name for the snap-in, and then
click Save .
* To save the snap-in to a location other than the Administrative Tools folder, in Save in, navigate to a location
for the snap-in. In File name , type a name for the snap-in, and then click Save .
QUESTION 160
Your network contains a domain controller that is configured as a DNS server. The server hosts an Active
Directory-integrated zone for the domain. You need to reduce how long it takes until stale records are deleted
from the zone.
What should you do?
A. From the configuration directory partition of the forest, modify the tombstone lifetime.

B. From the configuration directory partition of the forest, modify the garbage collection interval.
C. From the aging properties of the zone, modify the no-refresh interval and the refresh interval.
D. From the start of authority (SOA) record of the zone, modify the refresh interval and the expire interval.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Scavenging automates the deletion of old records. When scavenging is enabled, then you should also change
the no-refresh and refresh intervals of the aging properties of the zone else it may take too long for stale
records to be deleted and the size of the DNS database can become large and have an adverse effect on
performance.
QUESTION 161
You have an Active Directory domain named contoso.com.
You have a domain controller named Server1 that is configured as a DNS server. Server1 hosts a standard
primary zone for contoso.com. The DNS configuration of Server1 is shown in the exhibit.
(Click the Exhibit button.)
You discover that stale resource records are not automatically removed from the contoso.com zone. You need
to ensure that the stale resource records are automatically removed from the contoso.com zone.
What should you do?

A. Set the scavenging period of Server1 to 0 days.

B. Modify the Server Aging/Scavenging properties.


C. Configure the aging properties for the contoso.com zone.
D. Convert the contoso.com zone to an Active Directory-integrated zone.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Scavenging or aging as it is also known as automates the deletion of old records. When scavenging is
disabled, these records must be deleted manually or the size of the DNS database can become large and
have an adverse effect on performance. In the exhibit it shows that scavenging is enabled on Server1, thus
you should configure the aging properties for the zone.
QUESTION 162
You have a server that runs Windows Server 2012 R2.
The server contains the disks configured as shown in the following table.

You need to create a volume that can store up to 3 TB of user files. The solution must ensure that the user
files are available if one of the disks in the volume fails.
What should you create?
A.
B.
C.
D.
E.
F.
G.
H.

a storage pool on Disk 2 and Disk 3


a spanned volume on Disk 2 and Disk 3
a mirrored volume on Disk 1 and Disk 3
a mirrored volume on Disk 2 and Disk 3
a RAID-5 volume on Disk 1, Disk 2, and Disk 3
a storage pool on Disk 1 and Disk 3
a spanned volume on Disk 0 and Disk 4
a mirrored volume on Disk 1 and Disk 4

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 163
You have a server that runs Windows Server 2012 R2.
The server contains the disks configured as shown in the following table.

You need to create a volume that can store up to 3 TB of user files. The solution must ensure that the user
files are available if one of the disks in the volume fails.
What should you create?
A.
B.
C.
D.

A mirrored volume on Disk 1 and Disk 4


A storage pool on Disk 2 and Disk 3
A storage pool on Disk 1 and Disk 3
A mirrored volume on Disk 2 and Disk 3

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
A mirrored volume provides an identical twin of the selected volume. All data written to the mirrored volume is
written to both volumes, which results in disk capacity of only 50 percent. Any volume can be mirrored,
including the system and boot volumes. The disk that you select for the shadow volume does not need to be
identical to the original disk in size, or in its number of tracks and cylinders. This means that you do not have to
replace a failed disk with an identical model. The unused area that you select for the shadow volume cannot
be smaller than the original volume. If the area that you select for the shadow volume is larger than the
original, the extra space on the shadow disk can be configured as another volume. Dynamic disks provide
features that basic disks do not, such as the ability to create volumes that span multiple disks (spanned and
striped volumes) and the ability to create fault-tolerant volumes (mirrored and RAID-5 volumes).
The following operations can be performed only on dynamic disks:
Create and delete simple, spanned, striped, mirrored, and RAID-5 volumes.
Extend a simple or spanned volume.
Remove a mirror from a mirrored volume or break the mirrored volume into two volumes.
Repair mirrored or RAID-5 volumes.
Reactivate a missing or offline disk.
You need at least two dynamic disks to create a mirrored volume. Mirrored volumes are fault tolerant and use
RAID-1, which provides redundancy by creating two identical copies of a volume.
Mirrored volumes cannot be extended.
Both copies (mirrors) of the mirrored volume share the same drive letter.

http://technet.microsoft.com/en-us/library/cc779765%28v=ws.10%29.aspx http://msdn.microsoft.com/en-us/
library/windows/desktop/aa363785%28v=vs.85%29.aspx http://technet.microsoft.com/en-us/library/
cc938487.aspx
QUESTION 164
Your network contains an Active Directory domain named contoso.com. The domain contains three servers
named Server1, Served, and Server3.
You create a server group named ServerGroup1.
You discover the error message shown in the following exhibit. (Click the Exhibit button.)

You need to ensure that Server2 can be managed remotely by using Server Manager.
What should you do?
A.
B.
C.
D.

On DC1, run the Enable-PSSessionConfiguration cmdlet.


On Server2, run the Add-Computer cmdlet.
On Server2/ modify the membership of the Remote Management Users group.
From Active Directory Users and Computers, add a computer account named Server2, and then restart
Server2.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:

This is a security issue. To be able to access Server2 remotely through Server Manager the user need to be a
member of the Remote Management Users group.
Note:
* Name: BUILTIN\Remote Management Users
Description: A Builtin Local group. Members of this group can access WMI resources over management
protocols (such as WS-Management via the Windows Remote Management service). This applies only to WMI
namespaces that grant access to the user.
* Enable-ServerManagerStandardUserRemoting
Provides one or more standard, non-Administrator users access to event, service, performance counter, and
role and feature inventory data for a server that you are managing by using Server Manager.
Syntax:
Parameter Set: Default
Enable-ServerManagerStandardUserRemoting [-User] <String[]> [-Force] [-Confirm] [-WhatIf]
[ <CommonParameters>]
Detailed Description
Provides one or more standard, non-Administrator users access to event, service, performance
counter, and role and feature inventory data for a server that you are managing, either locally or remotely, by
using Server Manager. The cmdlet must be run locally on the server that you are managing by using Server
Manager. The cmdlet works by performing the following actions:
Adds access rights for specified standard users to the root\cimv2 namespace on the local server (for access to
role and feature inventory information).
Adds specified standard users to required user groups (Remote Management Users, Event Log Readers, and
Performance Log Readers) that allow remote access to event and performance counter logs on the managed
server.
Changes access rights in the Service Control Manager to allow specified standard users remote access to the
status of services on the managed server.
Incorrect:
Not A: the Enable-PSSessionConfiguration.This is an advanced cmdlet that is designed to be used by system
administrators to manage customized session configurations for their users.
Reference: Enable-ServerManagerStandardUserRemoting
QUESTION 165
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role
installed. An iSCSI SAN is available on the network. Server1 hosts four virtual machines named VM1, VM2,
VM3, and VM4.
You create a LUN on the SAN.
You need to provide VM1 with access to the LUN. The solution must prevent other virtual machines from
accessing the LUN.
What should you configure?
A.
B.
C.
D.
E.

A fixed-size VHDX
A fixed-size VHD
A dynamically expanding VHD
A dynamically expanding VHDX
A pass-through disk

Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
Explanation:
You can use physical disks that are directly attached to a virtual machine as a storage option on
themanagement operating system. This allows virtual machines to access storage that is mapped directly to
theserver running Hyper-V without first configuring the volume. The storage can be either a physical disk which
isinternal to the server, or a SAN logical unit number (LUN) that is mapped to the server (a LUN is a
logicalreference to a portion of a storage subsystem). The virtual machine must have exclusive access to

thestorage, so the storage must be set in an Offline state in Disk Management. The storage is not limited
insize, so it can be a multiterabyte LUN. When using physical disks that are directly attached to a virtual
machine, you should be aware of the following:
This type of disk cannot be dynamically expanded.
You cannot use differencing disks with them.
You cannot take virtual hard disk snapshots.
Att:
If you are installing an operating system on the physical disk and it is in an Online state before the
virtualmachine is started, the virtual machine will fail to start. You must store the virtual machine configuration
file inan alternate location because the physical disk is used by the operating system installation. For
example,locate the configuration file on another internal drive on the server running Hyper-V.
http://technet.microsoft.com/en-us/library/ee344823%28v=ws.10%29.aspx http://blogs.technet.com/b/askcore/
archive/2008/10/24/configuring-pass-through-disks-inhyper- v.aspx

QUESTION 166
Your network contains an Active Directory domain named contoso.com. The domain contains a print server
named Server1 that runs Windows Server 2012 R2. Server1 contains a local group named Group1.
You share a printer named Printer1 on Server1.
You need to configure Printer1 to meet the following requirements:
- Ensure that the members of Group1, the Server Operators group, the Administrators group, and the Print
Operators group can send print jobs to Printer1.
- Prevent other users from sending print jobs to Printer1.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A.
B.
C.
D.
E.

Assign the Print permission to the Server Operators group


Remove the permissions for the Creator Owner group.
Remove the permissions for the Everyone group.
Assign the Print permission to Group1.
Assign the Print permission to the Administrators group.

Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
C: To prevent other users from sending print jobs to Printer1
D: To enable Group1 to send print jobs.
Note: The Server Operators group, the Administrators group, and the Print Operators group are all built-in and
already have permissions to send print jobs.
QUESTION 167
You have a new server named Server1 that runs Windows Server 2012 R2. Server1 has two dual- core
processors and 32 GB of RAM.
You install the Hyper-V server role on Server1.
You create two virtual machines on Server1 that each have 8 GB of memory. You need to minimize the
amount of time it takes for both virtual machines to access memory.
What should you configure on each virtual machine?
A.
B.
C.
D.

Resource control
Dynamic Memory
NUMA topology
Memory weight

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Windows Server 2012 introduced support for projecting a virtual NUMA topology into Hyper-V virtual
machines. This capability can help improve the performance of workloads running on virtual machines that are
configured with large amounts of memory.
QUESTION 168
You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1. You need to
add a graphical user interface (GUI) to Server1.
Which tool should you use?
A.
B.
C.
D.
E.
F.
G.
H.

the dism.exe command


the Add-WindowsFeature cmdlet
the imagex.exe command
the setup.exe command
the ocsetup.exe command
the Add-WindowsPackage cmdlet
the Install-Module cmdlet
the Install-RoleService cmdlet

Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Add-WindowsFeature -The Add-WindowsFeature cmdlet allows you to install specified roles, role services,
and features on a computer that is running Windows Server 2008 R2.
Install-WindowsFeature -Installs one or more Windows Server roles, role services, or features on either the
local or a specified remote server that is running Windows Server 2012 R2. This cmdlet is equivalent to and
replaces Add-WindowsFeature, the cmdlet that was used to install roles, role services, and features in
Windows Server 2008 R2.
dism /online /get-features PS C:\> Install-WindowsFeature -Name Web-Server IncludeAllSubFeature ComputerName Server1 -WhatIf
http://technet.microsoft.com/en-us/library/hh824822.aspx http://technet.microsoft.com/en-us/library/dd744582
(v=ws.10).aspx http://technet.microsoft.com/en-us/library/jj205467(v=wps.620).aspx
QUESTION 169
You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has the Hyper-V server role installed.
You need to configure storage for a virtual machine to meet the following requirements:
- Support up to 3 TB of data on a single hard disk.
- Allocate disk space as needed.
- Use a portable storage format.
What should you configure?
A. A pass-through disk

B.
C.
D.
E.

A fixed-size VHD
A dynamically expanding VHD
A fixed-size VHDX
A dynamically expanding VHDX

Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/hh831446.aspx Support for virtual hard disk storage capacity of up to
64 TB.
vhd max is 2TB
QUESTION 170
Your network contains an Active Directory domain named contoso.com. All user accounts are in an
organizational unit (OU) named Employees.
You create a Group Policy object (GPO) named GP1.
You link GP1 to the Employees OU.
You need to ensure that GP1 does not apply to the members of a group named Managers.
What should you configure?
A.
B.
C.
D.

The Security settings of Employees


The WMI filter for GP1
The Block Inheritance option for Employees
The Security settings of GP1

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Wrong Group
B. Windows Management Instrumentation (WMI) filters allow you to dynamically determine the scope of Group
Policy objects (GPOs) based on attributes of the target computer. C. Blocking inheritance prevents Group
Policy objects (GPOs) that are linked to higher sites,
domains, or organizational units from being automatically inherited by the child-level. D. Set Managers to Members of this security group are exempt from this Group Policy object.
Security settings.
You use the Security Settings extension to set security options for computers and users within the scope of a
Group Policy object.
You can define local computer, domain, and network security settings. Figure belows shows an example of the
security settings that allow everyone to be affected by this GPO except the members of the Management
group, who were explicitly denied permission to the GPO by setting the Apply Group Policy ACE to Deny. Note
that if a member of the Management group were also a member of a group that had an explicit Allow setting for
the Apply Group Policy ACE, the Deny would take precedence and the GPO would not affect the user.

http://technet.microsoft.com/en-us/library/bb742376.aspx http://technet.microsoft.com/en-us/library/cc786636
(WS.10).aspx http://technet.microsoft.com/en-us/library/cc731076.aspx http://technet.microsoft.com/en-us/
library/cc779036(v=ws.10).aspx
QUESTION 171
You have a virtual machine named VM1.
You install Windows Server 2012 R2 on VM1.
You plan to use VM1 as an image that will be distributed to sales users to demonstrate the features of a
custom application. The custom application only requires the Web Server (IIS) server role to be installed.
You need to ensure that the VHD file for VM1 only contains the required Windows Server 2012 R2 source files.
Which tool should you use?

A.
B.
C.
D.

dism.exe
ocsetup.exe
imagex.exe
servermanagercmd.exe

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/magazine/dd490958.aspx You can use DISM to:
Add, remove, and enumerate packages and drivers.
Enable or disable Windows features.
Apply changes based on the offline servicing section of an unattend.xml answer file.
Configure international settings.
Upgrade a Windows image to a different edition.
Prepare a Windows PE image.
Take advantage of better logging.
Service down-level operating systems like Windows Vista with SP1 and Windows Server 2008.
Service all platforms (32-bit, 64-bit, and Itanium).
Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host.
Make use of old Package Manager scripts.
QUESTION 172
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. On Server1, you
create and start a virtual machine named VM1. VM1 is configured as shown in the following table.

You plan to create a snapshot of VM1.


You need to recommend a solution to minimize the amount of disk space used for the snapshot of
VM1.
What should you do before you create the snapshot?
A.
B.
C.
D.

Run the Stop-VM cmdlet.


Run the Convert-VHD cmdlet.
Decrease the Maximum RAM
Decrease the Minimum RAM.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
What are virtual machine snapshots?
Virtual machine snapshots capture the state, data, and hardware configuration of a running virtual machine.

What are snapshots used for?


Snapshots provide a fast and easy way to revert the virtual machine to a previous state. For this reason, virtual
machine snapshots are intended mainly for use in development and test environments. Having an easy way to
revert a virtual machine can be very useful if you need to recreate a specific state or condition so that you can
troubleshoot a problem. There are certain circumstances in which it may make sense to use snapshots in a
production environment. For example, you can use snapshots to provide a way to revert a potentially risky
operation in a production environment, such as applying an update to the software running in the virtual
machine.
How are snapshots stored?
Snapshot data files are stored as .avhd files. Taking multiple snapshots can quickly consume storage space.
In the first release version of Hyper-V (KB950050) and in Hyper-V in Windows Server 2008 Service Pack 2,
snapshot, snapshot data files usually are located in the same folder as the virtual machine by default. In
Hyper-V in Windows Server 2008 R2, the files usually are located in the same folder as the virtual hard disk.
The following exceptions affect the location of the snapshot data files: If the virtual machine was imported with
snapshots, they are stored in their own folder. If the virtual machine has no snapshots and you configure the
virtual machine snapshot setting, all snapshots you take afterwards will be stored in the folder you specify.
http://technet.microsoft.com/pt-pt/library/dd560637%28v=ws.10%29.aspx Reducing the available RAM for the
VM would reduce the size of the snapshot,what better than have the machine turn off, not using any memory ;)
QUESTION 173
Your network contains an Active Directory domain named contoso.com. The domain contains a file server
named Server1 that runs Windows Server 2012 R2. Server1 contains a shared folder named Share1. Share1
contains the home folder of each user. All users have the necessary permissions to access only their home
folder. The users report that when they access Share1, they can see the home folders of all the users. You
need to ensure that the users see only their home folder when they access Share1.
What should you do from Server1?
A.
B.
C.
D.

From Windows Explorer, modify the properties of the volume that contains Share1.
From Server Manager, modify the properties of the volume that contains Share1.
From Server Manager, modify the properties of Share1.
From Windows Explorer, modify the properties of Share1.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc784710(v=ws.10).aspx Access based enumeration needs to be
enabled:
QUESTION 174
In an isolated test environment, you deploy a server named Server1 that runs a Server Core Installation of
Windows Server 2012 R2.
The test environment does not have Active Directory Domain Services (AD DS) installed. You install the Active
Directory Domain Services server role on Server1.
You need to configure Server1 as a domain controller.
Which cmdlet should you run?
A.
B.
C.
D.

Install-ADDSDomainController
Install-ADDSDomatn
Install-ADDSForest
Install-WindowsFeature

Correct Answer: C
Section: (none)

Explanation
Explanation/Reference:
Explanation:
Install-ADDSDomainController - Installs a domain controller in Active Directory. Install-ADDSDomain - Installs
a new Active Directory domain configuration. Install-ADDSForest - Installs a new Active Directory forest
configuration. Install-WindowsFeature - Installs one or more Windows Server roles, role services, or features
on either thelocal or a specified remote server that is running Windows Server 2012 R2. This cmdlet is
equivalent to andreplaces Add-WindowsFeature, the cmdlet that was used to install roles, role services, and
features.
C:\PS>Install-ADDSForest -DomainName corp.contoso.com -CreateDNSDelegation DomainMode Win2008 ForestMode Win 2008 R2 - DatabasePath "d:\NTDS" -SysvolPath "d:\SYSVOL" - LogPath "e:\Logs"
Installs a new forest named corp.contoso.com, creates a DNS delegation in the contoso.com domain,
setsdomain functional level to Windows Server 2008 R2 and sets forest functional level to Windows Server
2008,installs the Active Directory database and SYSVOL on the D:\ drive, installs the log files on the E:\ drive
andhas the server automatically restart after AD DS installation is complete and prompts the user to provide
andconfirm the Directory Services Restore Mode (DSRM) password. http://technet.microsoft.com/en-us/library/
hh974720%28v=wps.620%29.aspx
QUESTION 175
Your network contains an Active Directory domain named adatum.com. You discover that when users join
computers to the domain, the computer accounts are created in the Computers container.
You need to ensure that when users join computers to the domain, the computer accounts are automatically
created in an organizational unit (OU) named All_Computers.
What should you do?
A.
B.
C.
D.

From a command prompt, run the redircmp.exe command.


From Windows PowerShell, run the Move-ADObject cmdlet.
From Ldp, configure the properties of the Computers container.
From ADSI Edit, configure the properties of the OU1 object.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc770619.aspx Redirects the default container for newly created
computers to a specified, target organizational unit (OU) so that newly created computer objects are created in
the specific target OU instead of in CN=Computers.
QUESTION 176
Your network contains an Active Directory domain named contoso.com. The domain contains a user account
named User1 that resides in an organizational unit (OU) named OU1. A Group Policy object (GPO) named
GPO1 is linked to OU1. GPO1 is used to publish several applications to a user named User1. In the Users
container, you create a new user named User2. You need to ensure that the same applications are published
to User2.
What should you do?
A.
B.
C.
D.

Modify the security of GPO1.


Modify the settings in GPO1.
Link a WMI filter to GPO1.
Move User2 to OU1.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Explanation:
The GPO is linked to OU1. By moving User2 to OU1 the GPO will be applied to this user.
QUESTION 177
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers on the L2P.com network have Windows Server 2012 installed. L2P.com has a server, named L2PSR07, which has the AD DS, DHCP, and DNS server roles installed. L2P.com also has a server, named L2PSR08, which has the DHCP, and Remote Access server roles installed.
You have configured a server, which has the File and Storage Services server role installed, to automatically
acquire an IP address. The server is named L2PSR09.
You then create a filter on L2P-SR07.
Which of the following is a reason for this configuration?
A.
B.
C.
D.

To make sure that L2P-SR07 issues L2P-SR09 an IP address.


To make sure that L2P-SR07 does not issue L2P-SR09 an IP address.
To make sure that L2P-SR09 acquires a constant IP address from L2P-SR08 only.
To make sure that L2P-SR09 is configured with a static IP address.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Enable and Configure MAC Address Filtering MAC address filtering (aka link-layer filtering) is a feature for
IPv4 addresses that allows you to include or exclude computers and devices based on their MAC address.
Denying a Single MAC Address You can see from the first figure that we've got a system that this DHCP
server has given an address lease. Just to demonstrate the simplest possible case of MAC filtering in DHCP,
let's block that system from ever getting an IP address from this DHCP server again. To deny MAC ADDRESS
from getting an IP address, right-click the PC entry in the "Address Leases" folder, then choose Add to Filter /
Deny, as you see in the following figure:

At this point, the "Deny" folder has a rule in it, as you can see by opening the Filters / Deny folder:

If you had more than one existing lease that you wanted to add to the "deny" filter (or, for that matter, the
"allow" filter) then you could also multi-select or block-select any number of existing leases, right-click and then
deny (or allow) them en masse.
You must enable Deny filter for it to work.
http://technet.microsoft.com/en-us/magazine/ff521761.aspx http://blogs.technet.com/b/teamdhcp/
archive/2012/11/10/dhcp-mac-address-filter-management- made- easy-with-dhcp-powershell.aspx
http://technet.microsoft.com/en-us/library/hh831825.aspx http://technet.microsoft.com/en-us/library/
jj200226.aspx
QUESTION 178
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1. Server1 runs Windows Server 2012 R2. You need to create 3-TB virtual hard disk (VHD) on Server1.
Which tool should you use?
A.
B.
C.
D.

New-StorageSubsytemVirtualDisk
File Server Resource Manager (FSRM)
Server Manager
Computer Management

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:

For other questions to create a VHD (file) you can use computer management.
- Share and storage management (2008 only)
- New-storagesubsystemVirtualDisk (this is a virtual disk, NOT a virtual hard disk)
- Server Manager (you would use this to create virtual disks, not virtual hard disks)
QUESTION 179
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
Subsequent to deploying a Server Core Installation of Windows Server 2012 on a new L2P.com server, you
are instructed to add a graphical user interface (GUI) to the server.
You want to achieve this goal from the command prompt.
Which of the following actions should you take?
A.
B.
C.
D.

You should consider making use of the dism.exe command.


You should consider making use of the dsquery.exe command.
You should consider making use of the dsadd.exe command.
You should consider making use of the dsrm.exe command.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Deployment Image Servicing and Management (DISM)
B. dsquery Queries the directory by using search criteria that you specify C. dsadd Adds specific types of
objects to the directory.
D. dsrm Deletes an object of a specific type or any general object from the directory. The Deployment Image
Servicing and Management (DISM) tool replaces the pkgmgr, PEImg, and IntlConfg tools that are being retired
in Windows 7. DISM provides a single centralized tool for performing all of the functions of these three tools in
a more efficient and standardized way, eliminating the source of many of the frustrations experienced by
current users of these tools. Dism /online /enable-feature /featurename:Server-Gui-Mgmt /featurename:ServerGui-Shell / featurename:ServerCore-FullServer
http://msdn.microsoft.com/en-us/library/windows/desktop/dd371719%28v=vs.85%29.aspx
QUESTION 180
Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains
several virtual machines that run Windows Server 2012 R2. You install the Network Load Balancing feature on
the virtual machines. You need to configure the virtual machines to support Network Load Balancing (NLB).
Which virtual machine settings should you configure?
A.
B.
C.
D.

Port mirroring
DHCP guard
Router guard
MAC address

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://social.technet.microsoft.com/Forums/windowsserver/en-US/5b3a0a9d-26a2-49ba-bbbe- 29d11fcbb7ce/
nlb-on-hyperv?forum=winserverhyperv
For NLB to be configured you need to enable MAC address spoofing.
QUESTION 181

Your network contains an Active Directory forest that contains two domains. The forest contains
five domain controllers. The domain controllers are configured as shown in the following table.

You need to configure DC5 as a global catalog server.


Which tool should you use?
A.
B.
C.
D.

Active Directory Domains and Trusts


Active Directory Users and Computers
Active Directory Administrative Center
Active Directory Sites and Services

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
If you have more than one domain in your forest and you have a significant user population in a site, you
canoptimize the speed and efficiency of domain logons and directory searches by adding a global catalog
server tothe site. If you have a single-domain forest, global catalog servers are not required for logons, but
directory searchesare directed to the global catalog. In this case, you can enable the global catalog on all
domain controllers forfaster directory searches. You can use the same user interface (UI) in the Active
Directory Sites and Services snap-in to add or removethe global catalog. Enabling the global catalog can
cause additional replication traffic. However, global catalogremoval occurs gradually in the background and
does not affect replication or performance. Membership in the Enterprise Admins group in the forest or the
Domain Admins group in the forest rootdomain, or equivalent, is the minimum required to complete this
procedure. To add or remove the global catalogOpen Active Directory Sites and Services. To open Active
Directory Sites and Services, click Start, click Administrative Tools, and then click Active Directory Sites and
Services. To open Active Directory Sites and Services in Windows Server?2012, click Start , type dssite.msc.
In the console tree, click the server object to which you want to add the global catalog or from which youwant
to remove the global catalog.
Where?
Active Directory Sites and Services\Sites\SiteName\Servers In the details pane, right-click NTDS Settings of
the selected server object, and then click Properties. Select the Global Catalog check box to add the global
catalog, or clear the check box to remove theglobal catalog.
Global catalog servers and sites
To optimize network performance in a multiple-site environment, consider adding global catalog servers in
sitesaccording to the needs in the sites for fast search responses and domain logons. It is recommended to
makeall domain controllers be global catalog severs if possible. In a single-site, multiple-domain environment,
asingle global catalog server is usually sufficient to cover common Active Directory queries and logons.
QUESTION 182
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers on the L2P.com network have Windows Server 2012 installed. You have received instructions to
install the Remote Desktop Services server role on a server, named L2P-SR07.

You want to achieve this remotely from a server, named L2P-SR06.


Which of the following actions should you take?
A.
B.
C.
D.

You should consider accessing the Server Manager console on L2P-SR07.


You should consider accessing the Server Manager console on L2P-SR06.
You should consider accessing the TS Manager console on L2P-SR07.
You should consider accessing the TS Manager console on L2P-SR06.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Windows Server 2012 delivers capabilities to manage many servers and the devices connecting them,
whether they are physical or virtual, on-premises or off. With Windows Server 2012 R2, you can rely on new
management capabilities for connecting to multiple machines through a single interface, robust automation to
help improve compliance, increasing efficiency through automation and creating unified experiences across
physical and virtual platforms.

http://www.microsoft.com/en-us/server-cloud/windows-server/server-management- automation.aspx
http://www.techieshelp.com/windows-server-2012-install-and-configure-remote-desktop-services/ http://
technet.microsoft.com/en-us/library/cc742813.aspx http://technet.microsoft.com/en-us/library/hh831809.aspx
http://technet.microsoft.com/en-us/library/hh831456.aspx
QUESTION 183
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1. Server1 runs Windows Server 2012 R2. You need to create 3-TB virtual hard disk (VHD) on Server1.
Which tool should you use?
A.
B.
C.
D.

File Server Resource Manager (FSRM)


New-StoragePool
Diskpart
Share and Storage Management

Correct Answer: C
Section: (none)

Explanation
Explanation/Reference:
Explanation:
Diskpart - "create vdisk file=c:\test.vhd maximum=3000000 type=expandable"

http://www.hyper-v.nu/archives/hvredevoort/2012/01/windows-8-storage-and-hyper-v-part-2-vhdxandpowershell/
http://www.hyper-v.nu/archives/hvredevoort/2012/04/windows-8-storage-and-hyper-v-part-3-the- art-ofcreatinga-vhd-2/
http://technet.microsoft.com/library/hh831487
QUESTION 184
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1 that runs Windows Server 2012 R2.
You create a new inbound rule by using Windows Firewall with Advanced Security. You need to configure the
rule to allow Server1 to accept unsolicited inbound packets that are received through a network address
translation (NAT) device on the network.
Which setting in the rule should you configure?
A.
B.
C.
D.

Edge traversal
Authorized computers
Interface types
Remote IP address

Correct Answer: A

Section: (none)
Explanation
Explanation/Reference:
Explanation:
Edge traversal - This indicates whether edge traversal is enabled (Yes) or disabled (No). When edge
traversalis enabled, the Application, service, or port to which the rule Applies is globally addressable and
accessiblefrom outside a network address translation (NAT) or edge device.

Select one of the following options from the list:


Block edge traversal (default) - Prevent Applications from receiving unsolicited traffic from the Internet
througha NAT edge device.
Allow edge traversal - Allow Applications to receive unsolicited traffic directly from the Internet through aNAT
edge device.
Defer to user - Let the user decide whether to allow unsolicited traffic from the Internet through a NAT
edgedevice when an Application requests it.
Defer to Application - Let each Application determine whether to allow unsolicited traffic from the

Internetthrough a NAT edge device.


http://technet.microsoft.com/en-us/library/cc731927.aspx http://technet.microsoft.com/en-us/library/dd421713%
28v=ws.10%29.aspx
QUESTION 185
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers on the L2P.com network have Windows Server 2012 installed. You are in the process of installing a
Server Core installation of Windows Server 2012 on a new L2P.com server, named L2P-SR13.
Which of the following is TRUE with regards to a installing a Server Core installation of Windows Server 2012?
(Choose all that apply.)
A.
B.
C.
D.
E.

The Server Graphical Shell is installed, but not enabled.


Server roles can be configured locally via the command prompt using Windows PowerShell.
Server roles can be configured locally via Server Manager.
You are able to access the Microsoft Management Console locally.
The Desktop Experience is not available.

Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. There is no Windows shell and very limited GUI functionality B. The Server Core interface is a command
prompt with PowerShell support.
C. Only Remotely using Server Manager
D. Microsoft Management Console is not available locally E. Desktop Experience is not available
Server Core is a minimal server installation option for computers running on the operating system. Server Core
provides a low-maintenance server environment with limited functionality.
The minimal nature of Server Core creates limitations:
There is no Windows shell and very limited GUI functionality. The Server Core interface is a command prompt
with PowerShell support.
There is limited MSI support (unattended mode only).
Server Graphical Shell is not installed
Microsoft Management Console: not available locally.
Desktop Experience: not available.
http://msdn.microsoft.com/en-us/library/windows/desktop/hh846323%28v=vs.85%29.aspx http://
technet.microsoft.com/en-us/library/hh831786.aspx http://technet.microsoft.com/en-us/library/jj574205.aspx
http://technet.microsoft.com/en-us/library/ee441255%28v=ws.10%29.aspx
QUESTION 186
You have a server named Server1 that runs a Server Core installation of Windows Server 2012 R2. Server1 is
configured to obtain an IPv4 address by using DHCP. You need to configure the IPv4 settings of the network
connection on Server1 as follows:
- IP address: 10.1.1.1
- Subnet mask: 255.255.240.0
- Default gateway: 10.1.1.254
What should you run?
A.
B.
C.
D.

Set-NetlPInterface
netcfg.exe
New-NetlPAddress
msconfig.exe

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. The Set-NetIPInterface cmdlet modifies IP interface properties such as is DHCP, IPv6 neighbor discovery
settings, router settings and Wake on LAN (WoL) settings. The NetIPInterface object is automatically created
by the computer and thus the NetIPInterface object has no New or Remove verbs.
C. The New-NetIPAddress cmdlet creates IP address and the configuration properties of that IP address. To
create a specific IP address object, the required parameters include an IP address (IPv4 or IPv6) and an
interface (InterfaceIndex or InterfaceAlias). It is also recommended to define the prefix length, alsoknown as a
subnet mask, and default gateway. If DHCP is enabled on the interface to which this cmdlet is configured to,
then DHCP will automatically be disabled.

D. System Configuration Utility (Msconfig.exe) automates the routine troubleshooting steps that Microsoft
Product Support Services technicians use when diagnosing Windows configuration issues.
You can use this tool to modify the system configuration through a process of elimination with check boxes,
reducing the risk of typing errors.
http://technet.microsoft.com/en-us/library/hh826125(v=wps.620).aspx http://technet.microsoft.com/en-us/
library/hh826150%28v=wps.620%29.aspx http://windows.microsoft.com/en-us/windows7/change-tcp-ipsettings
QUESTION 187
Your network contains an Active Directory domain named adatum.com. The domain contains the servers

shown in the following table.

You need to ensure that you can use Server Manager on DC1 to manage DC2. Which two tasks should you
perform? (Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
E.

Install Microsoft .NET Framework 4 on DC2.


Install Remote Server Administration Tools on DC1.
Install the Windows PowerShell 2.0 engine on DC1.
Install Remote Server Administration Tools on DC2.
Install Windows Management Framework 3.0 on DC2.

Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
In Windows Server 2012 R2, you can use Server Manager to perform management tasks on remote servers.
Remote management is enabled by default on servers that are running Windows Server 2012 R2. To manage
a server remotely by using Server Manager, you add the server to the Server Manager server pool. You can
use Server Manager to manage remote servers that are running Windows Server 2008 and Windows Server
2008 R2, but the following updates are required to fully manage these older operating systems.
Windows Management Framework 3.0 To use this release of Server Manager to access and manage remote
servers that are running Windows Server 2008 or Windows Server 2008 R2, you must first install .NET
Framework 4.0, and then install Windows Management Framework 3.0 on those servers.
QUESTION 188
You have a file server named Server1 that runs Windows Server 2012 R2.
Server1 contains a folder named Folder1.
You share Folder1 as Share1 by using Advanced Sharing. Access-based enumeration is enabled.
Share1 contains an application named Appl.exe.
You configure the NTFS permissions on Folder1 as shown in the following table.

The members of Group2 report that they cannot make changes to the files in Share1. The members of Group1
and Group2 run Appl.exe successfully. You need to ensure that the members of Group2 can edit the files in
Share1.
What should you do?
A. Edit the Share permissions.
B. Disable access-based enumeration.

C. Replace the NTFS permissions on all of the child objects.


D. Edit the NTFS permissions.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Suppose you've shared a folder on a Windows Server 2012 R2 system and you've created the share as a
readonlyshare, but the NTFS permissions for the folder are Full Control for the Everyone group. When conflicts
likethis arise between share and NTFS permissions, the most restrictive permission set wins out.
There are a number of additional settings that you can enable for the share. ABE allows users to see just
thefiles and folders to which they have been granted access and not even be able to see that other itemsexist.
http://blogs.technet.com/b/keithmayer/archive/2012/10/21/ntfs-shared-folders-a-whole-loteasier- inwindowsserver-2012.aspx
http://www.techrepublic.com/blog/networking/how-to-share-a-folder-in-windows- server2012/6057 http://
www.techrepublic.com/blog/networking/windows-server-2012-tips-for-setting-sharevs- ntfspermissions/6204
QUESTION 189
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. On Server1, you
create and start a virtual machine named VM1. VM1 is configured as shown in the following table.

You need to recommend a solution to minimize the amount of disk space used for the snapshot of VM1. What
should you do before you create the snapshot?
A.
B.
C.
D.

Convert diskl.vhd to a dynamically expanding disk.


Shutdown VM1.
Decrease the Minimum RAM.
Decrease the Maximum RAM.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Original answer is A.
But the correct answer is B.
Was the VM running when you took the snapshot?
Here is a big one. If the VM was running the VM can be restored to that previously running state. Thus all that
occupied memory space must be saved as well. Now, not only is the disk (potentially) using more storage, but
the SQL instance in the VM was set to use 2Gb of RAM, and all of that memory space must be saved as well.
QUESTION 190
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server 1. Server1 runs Windows Server 2012 R2. You need to create 3-TB virtual hard disk (VHD) on Server1.

Which tool should you use?


A.
B.
C.
D.

New-StorageSubsytemVirtualDisk
Share and Storage Management
Computer Management
File Server Resource Manager (FSRM)

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
For other questions to create a VHD (file) you can use computer management.
- Share and storage management (2008 only)
- New-storagesubsystemVirtualDisk (this is a virtual disk, NOT a virtual hard disk)
- Server Manager (you would use this to create virtual disks, not virtual hard disks)
QUESTION 191
Your network contains an Active Directory domain named contoso.com.
All servers run Windows Server 2012 R2.
When a domain user named User3 attempts to log on to a client computer named Client10, User3 receives the
message shown in the following exhibit. (Click the Exhibit button.)

You need to ensure that User3 can log on to Client10.


What should you do?
A.
B.
C.
D.

From Active Directory Users and Computers, configure the Logon Workstations setting of User3.
On Client10, modify the Allow log on locally User Rights Assignment.
From Active Directory Users and Computers, configure the Personal Virtual Desktop property of User3.
On Client10, modify the Deny log on locally User Rights Assignment.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
QUESTION 192
Your network contains an Active Directory domain named contoso.com. The domain contains a member
server named Server1 and a domain controller named DC2. All servers run Windows Server 2012 R2. All
domain controllers are configured as DNS servers. On Server1, you open Server Manager and you add DC2
as another server to manage. From Server Manager on Server2, you right-click DC2.
You need to ensure that when you right-click DC2, you see the option to run DNS Manager.
What should you do?

A.
B.
C.
D.

In the domain, add Server1 to the DNS Admins group.


On DC2 and Server1, run winrmquickconfig.
On DC2, install the Feature Administration Tools.
On Server1, install the Role Administration Tools.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
If you have installed Windows Server 2012 R2 Roles and Features using PowerShell or remote server admin
toolsor new multi server manager console, you will see that the management tools are missing from the server

onwhich you just have enabled the role or feature. This is because Microsoft has provided more granular
controlon what is installed on the Windows Server 2012 R2. As an administrator we have choice to include or
not toinclude management tools while installing the Roles and Features we choose.
The goal for Windows Server 2012 administration is to manage remotely from Windows Server 2012 box
thatwill act as the management host for all servers and will be accessed by all the IT administrators.
Typically, when a role is installed, the associated administration tools are also installed. However, sometimes
you simply need to add additional administrative tools.

http://technet.microsoft.com/en-us//library/cc731420%28v=ws.10%29.aspx http://windowsitpro.com/windowsserver-2012/q-im-missing-some-windows-server- 2012administration-toolshow-do-i-add-them


QUESTION 193
You have a server named Server1 that runs Windows Server 2012 R2. A network technician installs a new
disk on Server1 and creates a new volume. The properties of the new volume. You need to ensure that you
can restore files on volume D by using the Previous Versions tab.
What should you do first?

A.
B.
C.
D.

Convert the disk to a dynamic disk.


Format volume D.
Install the File Server Resource Manager role service.
Run the convert.exe command.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Shadow Copies for Shared Folders is activated at the volume level. The volume to be enabled for shadow
copies must use NTFS and can be saved either on a basic disk or adynamic disk. Assigning a drive letter to
the volume is optional; an NTFS volume with shadow copy enabled can be mountedas a folder on another
NTFS volume. You can only enable Shadow Copies of Shared Folders on a per-volume basis; that is, you
cannot selectspecific shared folders and files on a volume to be copied or not copied. By default, the shadow
copies will bestored on the volume that is being copied (the source volume). If you have more than one drive
available onyour server, you should use a separate volume on another disk to store the shadow copies. This
eliminates thepossibility that high input/output (I/O) load will cause shadow copies to be deleted. This is the
recommendedconfiguration for heavily used file servers.

http://technet.microsoft.com/pt-pt/magazine/2006.01.rapidrecovery%28en-us%29.aspx http://
technet.microsoft.com/en-us/library/cc875808.aspx

QUESTION 194
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. On Server1, you
create and start a virtual machine named VM1.

VM1 is configured as shown in the following table.


You plan to create a snapshot of VM1.
You need to recommend a solution to minimize the amount of disk space used for the snapshot of VM1.
What should you do before you create the snapshot?
A.
B.
C.
D.
E.
F.
G.
H.

Shut down VM1.


Decrease the Minimum RAM.
Decrease the Maximum RAM.
Configure VM1 to have a smaller virtual disk.
Convert disk1.vhd to a dynamically expanding disk.
Run the Stop-VM cmdlet.
Run the Resize-VHD cmdlet.
Run the Convert-VHD cmdlet.

Correct Answer: AF
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Virtual machine snapshots are file-based snapshots of the state, disk data, and configuration of a
virtualmachine at a specific point in time.
You can take multiple snapshots of a virtual machine, even while it is running. You can then revert the virtual
machine to any of the previous states by Applying a snapshot to the virtualmachine.
Taking a snapshot of a VM is to in essence freeze the current state and make it a parent disk based on
currentstate, and at the same time create a child disk to capture all subsequent changes. - See more at:
Snapshots require adequate storage space. Snapshots are stored as .avhd files in the same location at
thevirtual hard disk. Taking multiple snapshots can quickly consume a large amount of storage space.
When you use Hyper-V Manager to delete a snapshot, the snapshot is removed from the snapshot treebut the
.avhd file is not deleted until you turn off the virtual machine. Each snapshot introduces a parent-child
dependency of the runtime environment when the snapshot wastaken, and over time a series of backups will
results in a multi-level hierarchy of snapshots with nested parentchilddependencies.
When you have systems that are required to be up and running 24/7 it basically throws away any use
thatsnapshots have. It seems somewhat ridiculous that you have to bring a system down to delete the
snapshotwhen one of the reasons you created the snapshot was to help reduce downtime in case something
goeswrong. It is even more ridiculous that if you don't power down your system and wait for the vhd to
merge,the snapshot will continue to grow until the system comes crashing down due to a lack of disk space!
(Microsoft does not recommend snapshots for production environments)

http://www.laneolson.ca/2009/10/09/hyper-v-snapshots-and-disk-space/ http://blogs.technet.com/b/yungchou/
archive/2013/01/23/hyper-v-virtual-hard-disk-vhdoperations- explained.aspx
http://zoom.it/12u8

http://www.server-talk.eu/wp-content/uploads/article_2010-05-28_02.png http://blogs.msdn.com/b/

virtual_pc_guy/archive/2009/04/15/what-happens-when-i-delete- asnapshot-hyper-v.aspx
QUESTION 195
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1. Server1 runs Windows Server 2012 R2. You need to create 3-TB virtual hard disk (VHD) on Server1.
Which tool should you use?
A.
B.
C.
D.
E.
F.
G.
H.

Diskpart
Server Manager
Computer Management
New-VirtualDisk
Share and Storage Management
File Server Resource Manager (FSRM)
New-StorageSubsytemVirtualDisk
New-StoragePool

Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The New-VirtualDisk command creates a new virtual disk in the specified storage pool. New- VirtualDisk Creates a new virtual disk in the specified storage pool. Although the new Server Manager UI in Windows
Server 2012 R2 provides a very convenient and intuitiveworkflow to provision and manage Storage, interaction
with PowerShell is required to access many of theadvanced features.
If I then create a simple 200GB Virtual Disk via the UI named VDiskSimpleUI, the resulting Virtual
Diskleverages 8 columns and maintains 1 copy of the data. But when creating the Virtual Disk via PowerShell,
Ican force the tripping across all nine of the disks and optimize performance. New- VirtualDisk StoragePoolFriendlyName Pool01 -ResiliencySettingName Simple -Size 200GB FriendlyNameVDiskSimplePS -ProvisioningType Fixed -NumberOfDataCopies 1 NumberOfColumns 9 And
creating a mirrored 200GB Virtual Disk via the UI named VDiskMirrorUI produces a Virtual Disk with 4columns
and 2 data copies. But with PowerShell, I can create a slightly different configuration, increasing thedata
protection (and also the disk footprint):
New-VirtualDisk
-StoragePoolFriendlyName Pool01 -ResiliencySettingName Mirror -Size 200GB -FriendlyNameVDiskMirrorPS
-ProvisioningType Fixed -NumberOfDataCopies 3 NumberOfColumns 3.

http://blogs.technet.com/b/wincat/archive/2012/05/21/optimizing-windows-server-2012storagemanagementvia-powershell-for-both-performance-and-resiliency.aspx http://technet.microsoft.com/en-us/
library/hh848643%28v=wps.620%29.aspx
QUESTION 196
Your network contains an Active Directory domain named contoso.com. The domain contains two servers
named Server1 and Server2. Server1 runs Windows Server 2012 R2. Server2 runs Windows Server 2008 R2
Service Pack 1 (SP1) and has the DHCP Server server role installed. You need to manage DHCP on Server2
by using the DHCP console on Server1.
What should you do first?
A.
B.
C.
D.

From Server Manager on Server2, enable Windows Remote Management.


From a command prompt on Server2, run winrm.exe.
From Server Manager on Server1, install a feature.
From the Microsoft Management Console on Server1, add a snap-in.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
How do you enable remote management.
Assuming the remote server is all set up and prepared to enter production, first, open Server Manager on the
remote server. Click on the "Configure Server Manager for Remote Management" link. Select the "Enable
remote management of this server from other computers". Click "Ok".

Note:
* You can use Server Manager to manage remote servers that are running Windows Server 2008 and
Windows Server 2008 R2, but the following updates are required to fully manage these older operating
systems.
/ Windows Management Framework 3.0
/ Performance Updates
* Windows Server 2008 R2, unlike Windows Server 2008 RTM, has a nice feature that allows you to remotely
manage it, from another server or from a Windows 7 workstation, by using Server Manager.
* The tasks that you can perform remotely by using Server Manager include:
View Windows automatic updating status Run Best Practices Analyzer scans on roles.
View or change Windows Firewall information
View and manage roles
Manage installed services roles
View Internet Explorer Advanced Security Configuration settings (IE ESC) Configure Windows Error Reporting
View or change Windows Customer Experience Improvement Program (CEIP) status Reference:
Configure Remote Management in Server Manager
QUESTION 197
Your network contains a production Active Directory forest named contoso.com and a test Active Directory
forest named contoso.test. A trust relationship does not exist between the forests. In the contoso.test domain,
you create a backup of a Group Policy object (GPO) named GPO1. You transfer the backup of GPO1 to a
domain controller in the contoso.com domain. You need to create a GPO in contoso.com based on the settings
of GPO1. You must achieve this goal by using the minimum amount of administrative effort.
What should you do?
A. From Group Policy Management, right-click the Group Policy Objects container, and then click Manage
Backups.
B. From Group Policy Management, right-click the Starter GPOscontainer, and then click Manage Backups.
C. From Group Policy Management, create a new starter GPO.
Right-click the new starter GPO, and then click Restore from Backup.
D. From Group Policy Management, create a new GPO.
Right-click the new GPO, and then click Import Settings.

E.
F.
G.
H.

From Windows PowerShell, run the Copy-GPOcmdlet and the Restore-GPOcmdlet.


From Windows PowerShell, run the New-GPOcmdlet and the Import-GPOcmdlet.
From Windows PowerShell, run the New-GPOcmdlet and the Restore-GPOcmdlet.
From Windows PowerShell, run the Get-GPOcmdlet and the Copy-GPOcmdlet.

Correct Answer: DF
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The New-GPO cmdlet creates a new GPO with a specified name. By default, the newly created GPO is
notlinked to a site, domain, or organizational unit (OU). The Import-GPO cmdlet imports the settings from a
GPO backup into a specified target GPO. The targetGPO can be in a different domain or forest than that from
which the backup was made and it does nothave to exist prior to the operation. The Restore-GPO cmdlet
restores a GPO backup to the original domain from which it was saved. If theoriginal domain is not available,
or if the GPO no longer exists in the domain, the cmdlet fails.
http://technet.microsoft.com/en-us/library/cc781458(v=WS.10).aspx http://technet.microsoft.com/en-us/library/
hh967461.aspx http://technet.microsoft.com/en-us/library/ee461050.aspx http://technet.microsoft.com/en-us/
library/ee461044.aspx http://blogs.technet.com/b/askpfeplat/archive/2012/11/04/windows-server-2012-thenewand- improved-grouppolicy-management-console.aspx
QUESTION 198
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers on the L2P.com network have Windows Server 2012 R2 installed. You have received instructions to
convert a basic disk to a GPT disk. Which of the following is TRUE with regards to GPT disks? (Choose all that
apply.)
A.
B.
C.
D.
E.
F.

To convert a basic disk to a GPT disk, the disk must not contain any partitions or volumes.
You can convert a basic disk to a GPT disk, regardless of partitions or volumes.
GPT is required for disks larger than 2 TB.
GPT is required for disks smaller than 2 TB.
The GPT partition style can be used on removable media.
GPT disks make use of the standard BIOS partition table.

Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. For a drive to be eligible for conversion to dynamic, all basic data partitions on the drive must be contiguous
C. GPT allows a much larger partition size greater than 2 terabytes (TB) D. 2 terabytes is the limit for MBR
disks.
E. Dynamic disks are not supported on portable computers, removable disks, detachable disks that use USB
or IEEE 1394 interfaces
F. Windows only supports booting from a GPT disk on systems that contain Unified Extensible Firmware
Interface (UEFI) boot firmware.
Master boot record (MBR) disks use the standard BIOS partition table. GUID partition table (GPT) disks use
unified extensible firmware interface (UEFI). One advantage of GPT disks is that you can have more than four
partitions on each disk. GPT is also required for disks larger than 2 terabytes. Portable computers and
removable media. Dynamic disks are not supported on portable computers,
removable disks, detachable disks that use Universal Serial Bus (USB) or IEEE 1394 (also called FireWire)
interfaces, or on disks connected to shared SCSI buses. If you are using a portable computer and right-click a
disk in the graphical or list view in Disk Management, you will not see the option to convert the disk to dynamic.
Dynamic disks are a separate form of volume management that allows volumes to have noncontiguous extents

on one or more physical disks. Dynamic disks and volumes rely on the Logical Disk Manager (LDM) and
Virtual Disk Service (VDS) and their associated features. These features enable you to perform tasks such as
converting basic disks into dynamic disks, and creating fault-tolerant volumes. To encourage the use of
dynamic disks, multi-partition volume support was removed from basic disks, and is now exclusively supported
on dynamic disks. GPT disks can be converted to MBR disks only if all existing partitioning is first deleted, with
associated loss of data.
Q. What happens when a basic disk is converted to dynamic? A. For a drive to be eligible for conversion to
dynamic, all basic data partitions on the drive must be contiguous. If other unrecognized partitions separate
basic data partitions, the disk cannot be converted. This is one of the reasons that the MSR must be created
before any basic data partitions. The first step in conversion is to separate a portion of the MSR to create the
configuration database partition. All non-bootable basic partitions are then combined into a single data
container partition. Boot partitions are retained as separate data container partitions. This is analogous to
conversion of primary partitions.
Windows XP and later versions of the Windows operating system differs from Windows 2000 in that basic and
extended partitions are preferentially converted to a single 0x42 partition, rather than being retained as multiple
distinct 0x42 partitions as on Windows 2000. http://technet.microsoft.com/en-us/library/cc725671.aspx http://
msdn.microsoft.com/en-us/library/windows/desktop/aa363785%28v=vs.85%29.aspx http://
msdn.microsoft.com/en-us/library/windows/hardware/gg463525.aspx http://technet.microsoft.com/en-us/
library/cc757696.aspx http://technet.microsoft.com/en-us/library/cc776315.aspx

Exam D
QUESTION 1
Server1 runs Windows Server 2012 R2 and is installed as an FTP server. Client use App1 to connect to
Server1 for FTP. App1 use TCP port 21 for control and a dynamic port for data.
You have allowed port 21 in firewall.
What youshould next do to allow clients to use App1 to connect to server1 using ftp.
A.
B.
C.
D.

At Server1 allow firewall rule of outbound


At Server1 allow firewall rule of inbound
Netsh advfirewalldomainprofile state off
Netsh advfirewall set global StatefulFtp enable

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Set global statefulftp
Configures how Windows Firewall with Advanced Security handles FTP traffic that uses an initial connection
onone port to request a data connection on a different port. This affects both active and passive FTP.

http://technet.microsoft.com/en-us/library/cc771920%28v=ws.10%29.aspx http://support.microsoft.com/
kb/832017/en-us#method20
QUESTION 2
You have a server named Server1 that runs Windows Server 2012 R2. You plan to enable Hyper-V Network
Visualization on Server1. You need to install the Windows Network Virtualization Filter Driver on Server1.
Which Windows PowerShell cmdlet should you run?
A.
B.
C.
D.

Set-NetVirtualizationGlobal
Set-NetAdapterVmq
Add-WindowsFeature
Enable-NetAdapterBinding

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Hyper-V Network Virtrtualization runs multiple virtual networks on a physical network. And each virtual network
operates as if it is running as a physical network. The The Set-NetAdaptercmdlet sets the basic properties of a
network adapter such as virtual LAN (VLAN) identifier (ID) and MAC address. Thus if you add the binding
parameter to the command then you will be able to install the Windows Network Virtualization Filter Driver.
Step one:Enable Windows Network Virtualization (WNV).
This is a binding that is applied to the NIC that you External Virtual Switch is bound to. This can be a physical
NIC, it can be an LBFO NIC team. Either way, it is the network adapter that your External Virtual Switch uses
to exit the server.This also means that if you have multiple virtual networks or multiple interfaces that you can
pick and choose and it is not some global setting.If you have one External Virtual Switch this is fairly easy:
$vSwitch = Get-VMSwitch -SwitchType External# Check if Network Virtualization is bound# This could be done
by checking for the binding and seeing if it is enabledForEach-Object - InputObject $vSwitch {if ((GetNetAdapterBinding -ComponentID "ms_netwnv" - InterfaceDescription
$_.NetAdapterInterfaceDescription).Enabled -eq $false){ # Lets enable itEnable-NetAdapterBinding InterfaceDescription $_.NetAdapterInterfaceDescription - ComponentID "ms_netwnv"}}
QUESTION 3
A company has a forest with 4 sites. Subnets are as follows:
- MainOffice 172.16.1.0 Subnet: 255.255.255.0 Gateway 172.16.1.254
- Site1 192.168.12.0 Subnet: 255.255.255.0
- Site 2 192.168.13.0 Subnet: 255.255.255.0
- Site 3 192.168.14.0 Subnet: 255.255.255.0
- Site 4 192.168.15.0 Subnet: 255.255.255.0
You add a new server to the MainOffice and it needs to be able to communicate to all sites.
Which route command would you run?
A.
B.
C.
D.

route add -p 192.168.8.0 netmask 255.255.252.0 172.16.1.254


route add -p 192.168.0.0 netmask 255.255.248.0 172.16.1.254
route add -p 192.168.12.0 netmask 255.255.252.0 172.16.1.254
route add -p 192.168.12.0 netmask 255.255.240.0 172.16.1.254

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
Server 1 and Server2 host a load-balanced Application pool named AppPool1. You need to ensure
thatAppPool1 uses a group Managed Service Account as its identity.
Which 3 actions should you perform?
A. Install a domain controller that runs Windows Server 2012 R2, Run the New- ADServiceAccountcmdlet,
Modify the settings of AppPool1.
B. Configure the Security settings of the contoso.com zone.
C. Add a second legacy network adapter, and then run the Set-VMNetworkAdoptercmdlet.
D. From Windows Powershell, run Get-DNSServerDiagnostics.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
For the application pool to use a group Managed Service account as its identity you will have to make sure that
there is a domain controller where you can add the account and then modify the application pool accordingly.
Thus you should use the New- ADServiceAccount on the domain controller that will create a new Active
Directory service account.
QUESTION 5
Server1 runs Windows Server 2012 R2 and is installed as an FTP server. Client use App1 to connect to
Server1 for FTP. App1 use TCP port 21 for control and a dynamic port for data.
You have allowed port 21 in firewall.
What youshould next do to allow clients to use App1 to connect to server1 using ftp.
A.
B.
C.
D.

At Server1 allow firewall rule of outbound


At Server1 allow firewall rule of inbound
netshadvfirewalldomainprofile state off
netshadvfirewall set global StatefulFtp enable

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Set global statefulftp Configures how Windows Firewall with Advanced Security handles FTP traffic that uses
an initial connection onone port to request a data connection on a different port.
This affects both active and passive FTP.

http://technet.microsoft.com/en-us/library/cc771920%28v=ws.10%29.aspx http://support.microsoft.com/
kb/832017/en-us#method20
QUESTION 6

You run a Windows 2012 R2 Hyper-V Role Server, you need to shrink the size of files.vhd.
Which powershellcmdlet option you should run first?
A.
B.
C.
D.

Dismount-VHD
Mount-VHD
Resize-VHD
Convert-VHD

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
't support shrink. Convert-VHD - Converts the format, version type, Answer: Convert, as .vhd don
and block size of a virtual hard disk file. Convert-VHD - Path c:\test\files.vhd - DestinationPath
c:\test\testvhdx.vhdx The Resize-VHD cmdlet resizes a virtual hard disk. This cmdlet lets you shrink or expand
the size of a virtualhard disk, but the shrink operation is allowed only on VHDX virtual hard disks. The shrink
operation fails ifit would shrink the virtual disk to less than its minimum size 's MinimumSizeproperty). After
converting a dynamically
(available through the VHDX object
expanding VHD to the VHDX format, a new Shrink menu option becomesavailable in the Hyper-V UI as
shown. VHDX format VHDs only expose the Shrink option when there is free space in the VHDX file to reclaim.

http://technet.microsoft.com/en-us/library/hh848454.aspx http://blogs.msdn.com/b/virtual_pc_guy/
archive/2012/05/10/shrinking-a-vhd-in-windows- 8fast.aspx
http://technet.microsoft.com/en-us/library/hh848535.aspx
QUESTION 7
You only want to share a printer with Group1, administrators, central owner and operators. (pick 2 answers)
A. Add permissions to Group1
B. Remove permissions from administrators
C. Add permissions to operators

D. Add permissions to Central Owner


E. Remove permissions from everyone.
Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
Explanation:

QUESTION 8
A laptop with server 2012 R2 OS, you need to ensure that server 2012 R2 can use wireless network adapter.
Whatshould you do first?
A.
B.
C.
D.

use server manager to install the Wireless Lan Service Role


use server manager to install the Wireless Network Role
use server manager to install the Wireless Lan Service Feature
use server manager to install the Wireless Network Feature

Correct Answer: C

Section: (none)
Explanation
Explanation/Reference:
Explanation:

http://www.win2012workstation.com/wireless-networking/
QUESTION 9
Your network contains an Active Directory domain named contoso.com.
The domain contains a server namedServer1.
Server1 runs Windows Server 2012 R2 and has the HyperV server role installed. You need to log the amount
of system resources used by each virtual machine.
What should you do?
A.
B.
C.
D.

From Windows PowerShell, run the Enable-VMResourceMeteringcmdlet.


From Windows System Resource Manager, enable Accounting.
From Windows System Resource Manager, add a resource allocation policy.
From Windows PowerShell, run the Measure-VM cmdlet.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Enable-VMResourceMetering - The Enable-VMResourceMeteringcmdlet starts collecting resourceutilization

data for a virtual machine or resource pool.


http://technet.microsoft.com/en-us/library/hh848481
(v=wps.620).aspx
Measure-VM - The Measure-VM cmdlet reports data on processor usage, memory usage, network traffic,
anddisk capacity for one or more virtual machines.
http://technet.microsoft.com/en-us/library/hh848471
(v=wps.620).aspx
QUESTION 10
You work as an administrator at ABC.com. The ABC.com network consists of a single domain named
ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2
installed. ABC.com's user accounts are located in an organizational unit (OU), named ABCStaff. ABC.com's
managersbelong to a group, named ABCManagers. You have been instructed to create a new Group Policy
object (GPO) that should be linked to the ABCStaffOU, but not affect ABC.com's managers.
Which of the following actions should you take?
A.
B.
C.
D.

You should consider removing the user accounts of the managers from the ABCStaff OU.
You should consider configuring the new GPO's WMI filter.
You should consider adding the user accounts of ABC.com's managers to the Admins group.
You should consider adding the user accounts of ABC.com's managers to the localAdministrators group.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 11
You have two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2
are part of a workgroup. On Server1, you add Server2 to Server Manager. When you attempt to connect to
Server2 from Server Manager, you receive the following error message:
"Credentials not valid."
You need to ensure that you can manage Server2 from Server1 by using Server Manager on Server1.
What should you do?
A.
B.
C.
D.

On Server 2, run the Configure-SmRemotingcmdlet.


On Server 1, run the Set-NetFirewallRulecmdlet.
On Server 1, run the Set-Item cmdlet.
On Server 2, install the Remote Server Administration Tools (RSAT).

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Add and manage servers in workgroups
Although adding servers that are in workgroups to Server Manager might be successful, after --on a role or
group page that
they are added, the Manageability column of the Servers tile --can display Credentials not valid errors that
occur while trying to includes a workgroup server
connect to or collect data from the remote, workgroup server.
To add remote workgroup servers to Server Manager

On the computer that is running Server Manager, add the workgroup server name to the TrustedHosts list.
This is a requirement of NTLM authentication. To add a computer name to an existing list of trusted hosts, add
the Concatenate parameter to the command. For example, to add the Server01 computer to an existing list of
trusted hosts, use the following command.
Set-Item wsman:\localhost\Client\TrustedHosts Server01 -Concatenate -Force
https://technet.microsoft.com/en-us/library/hh831453.aspx
QUESTION 12
You have a server named Server1 that runs a Server Core installation of Windows Server 2012 R2 Standard.
You establish a Remote Desktop session to Server1.
You need to identify which task can be performed on Server1 from within the Remote Desktop session.
What should you identify?
A.
B.
C.
D.

Modify the network settings by using Sconfig.


Join a domain by using the System Properties.
Disable services by using Msconfig.
Install a feature by using Server Manger.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
In Windows Server 2012 R2, you can use the Server Configuration tool (Sconfig.cmd) to configure and
manage several common aspects of Server Core installations. You must be a member of the Administrators
group to use the tool. Sconfig.cmd is available in the Minimal Server Interface and in Server with a GUI mode.
QUESTION 13
You work as a senior administrator at Lead2pass.com. The Lead2pass.com network consists of a single
domain named Lead2pass.com. All servers on the Lead2pass.com network have Windows Server 2012 R2
installed.
You are running a training exercise for junior administrators.
You are currently discussing storage pools.
Which of the following are TRUE with regards to storage pools?
A.
B.
C.
D.

It allows you to group physical disks into one or more containers.


It prevents you from grouping physical disks into one or more containers.
It allows you to easily add storage with minor impact on users.
It allows you to easily add storage without impacting users.

Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Storage Space subsystem now virtualizes storage by abstracting multiple physical disks into a logical
construct with specified capacity
D. Thin provisioning
Windows Server 2012 R2 Storage Space subsystem now virtualizes storage by abstracting multiple physical
disks into a logical construct with specified capacity. The process is to group selected physical disks into a
container, the so-called storage pool. Some of the goals of Storage Spaces include the ability to:
Obtain and easily manage reliable and scalable storage with reduced cost Aggregate individual drives into

storage pools that are managed as a single entity Utilize simple inexpensive storage with or without external
storage 've created
Provision storage as needed from pools of storage you
Grow storage pools on demand
Use PowerShell to manage Storage Spaces for Windows 8 clients or Windows Server 2012 R2 Delegate
administration by specific pool
Use diverse types of storage in the same pool: SATA, SAS, USB, SCSI Use existing tools for backup/restore
as well as VSS for snapshots Designate specific drives as hot spares Automatic repair for pools containing hot
spares with sufficient storage capacity to cover what was lost Management can be local, remote, through
MMC, or PowerShell Limitations:
Not supported on boot, system, or CSV volumes (Storages Spaces formatted with ReFS can't be used for a
CSV)
Drives must be 10GB or larger
When you introduce a drive into a storage pool, the contents of the drive being added will be lost.
Add only un-formatted/un-partitioned drives
A simple storage pool must consist of at least one drive A mirrored pool must have at least 2 drives. For 3-way
mirroring there is an obvious need for more Three drive minimum for using Parity
All drives in a pool must use the same sector size
Fibre-channel and iSCSI are not supported
Storage must be storport.sys compatible
Virtual disks to be used with a failover cluster that emanate from a storage pool must use the NTFS file
system. ReFS or third-party file systems may be used for other purposes Thin provisioning is an end-to-end
storage provisioning solution. It requires planning for storage deployment and execution on the host and client
application. Windows thin provisioning features serve as the interfaces between the thin provisioning-capable
storage and the host server. Windows thin provisioning features include thin provisioning logical unit (LUN)
identification, thresholdnotification, handles for resource exhaustion, and space reclamation for delivering
highly availableand scalable storage provisioning service to end users. Storage Spaces can virtualize storage
to create what are called storage pools. A storage pool is an aggregation of unallocated space on physical
disks installed in or connected to servers (These disks could be installed inside servers on your network or
within just-a-bunch-of-disks (JBOD) enclosures). Storage pools are flexible and elastic, allowing you to add or
remove disks from the pool as your demand for storage grows or shrinks.
Once you've created a storage pool using Storage Spaces, you can provision storage from the pool by
creating virtual disks. A virtual disk behaves exactly like a physical disk except that it can span multiple
physical disks within the storage pool. Virtual disks can host simple volumes or volumes with resiliency
(mirroring or parity) to increase the reliability or performance of the disk. A virtual disk is sometimes called a
LUN. Storage Spaces is fully remoteable and scriptable. This increases the Operational simplicity.
Management is permitted through the Windows Storage Management API, WMI, and Windows PowerShell.
And, Storage Spaces can be easily managed through the File Services role in Server Manager.
http://blogs.technet.com/b/askpfeplat/archive/2012/10/10/windows-server-2012-storage-spaces- is-it-for- youcould-be.aspx
http://blogs.technet.com/b/yungchou/archive/2012/08/31/windows-server-2012-storagevirtualization- explained.aspx
http://msdn.microsoft.com/en-us/library/windows/hardware/hh770514.aspx http://blogs.msdn.com/b/clustering/
archive/2012/06/02/10314262.aspx http://blogs.msdn.com/b/b8/archive/2012/01/05/virtualizing-storage-forscale-resiliency-and- efficiency.aspx
http://blogs.technet.com/b/canitpro/archive/2012/12/20/windows-server-2012-it-camp-lab-3-thin- vs-fixedprovisioning-that-is-the-storage-management-question.aspx
QUESTION 14
You have a server named Server1. Server1 runs Windows Server 2012 R2 and is located in a perimeter
network.
You need to configure a custom connection security rule on Server1. The rule must encrypt network
communications across the Internet to a computer at another company. Which authentication method should
you configure in the connection security rule?
A. Advanced
B. User (Kerberos V5)

C. Computer (Kerberos V5)


D. Computer and user (Kerberos V5)
E. Default
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
You need to make use of Advanced authentication method to ensure that communication is encrypted over the
network to the other company from your custom connection security rule on Server1.
http://technet.microsoft.com/en-us/library/bb742516.aspx
QUESTION 15
Your network contains two Active Directory forests named contoso.com and adatum.com. All servers run
Windows Server 2012 R2. A one-way external trust exists between contoso.com and adatum.com.
Adatum.com contains a universal group named Group1. You need to prevent Group1 from being used to
provide access to the resources in contoso.com.
What should you do?
A.
B.
C.
D.

Modify the Managed By settings of Group1.


Modify the Allowed to Authenticate permissions in adatum.com.
Change the type of Group1 to distribution.
Modify the name of Group1.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
* Accounts that require access to the customer Active Directory will be granted a special right called Allowed to
Authenticate. This right is then applied to computer objects (Active Directory domain controllers and AD RMS
servers) within the customer Active Directory to which the account needs access.
* For users in a trusted Windows Server 2008 or Windows Server 2003 domain or forest to be able to access
resources in a trusting Windows Server 2008 or Windows Server 2003 domain or forest where the trust
authentication setting has been set to selective authentication, each user must be explicitly granted the
Allowed to Authenticate permission on the security descriptor of the computer objects (resource computers)
that reside in the trusting domain or forest.
QUESTION 16
Your network contains an Active Directory forest named contoso.com. The forest contains a child domain
named corp.contoso.com. The network has Microsoft Exchange Server 2010 deployed.
You need to create a mail-enabled distribution group.
Which type of group should you create?
A.
B.
C.
D.

Domain local
Global
Local
Universal

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/bb726978.aspx Universal groups Groups that are used to grant
permissions on a wide scale throughout a domain tree or forest. Members of global groups include accounts
and groups from any domain in the domain tree or forest.
Microsoft Exchange Server 2007: Implementation and Administration By Jim McBee, Benjamin Craig page
248:
Only universal groups should be used as mail-enabled groups.
QUESTION 17
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain.
The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.
The domain contains a user named User1 and a global security group named Group1.
You need to add a new domain controller to the domain.
You install Windows Server 2012 R2 on a new server named DC3.
Which cmdlet should you run next?
A.
B.
C.
D.
E.
F.
G.
H.

Add-AdPrincipalGroupMembership
Install-AddsDomainController
Install WindowsFeature
Install AddsDomain
Rename-AdObject
Set-AdAccountControl
Set-AdGroup
Set-User

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.mustbegeek.com/install-domain-controller-in-server-2012-using-windows-powershell/ It is the 2nd
step when installing a DC by powershell on a fresh server.
QUESTION 18
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain.
The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2. The
domain contains a user named User1 and a global security group named Group1. User1 logs on to a client
computer named Computer1.
You need to disable the computer account of Computer1.
Which cmdlet should you run?

A.
B.
C.
D.
E.
F.
G.
H.

Add-AdPrincipalGroupMembership
Install-AddsDomainController
Install WindowsFeature
Install AddsDomain
Rename-AdObject
Set-AdAccountControl
Set-AdGroup
Set-User

Correct Answer: F
Section: (none)

Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/ee617249.aspx Set-ADAccountControl
Enabled
Specifies if an account is enabled. An enabled account requires a password. This parameter sets the Enabled
property for an account object. This parameter also sets the ADS_UF_ACCOUNTDISABLE flag of the Active
Directory User Account Control (UAC) attribute.
Possible values for this parameter include:
$false or 0
$true or 1
The following example shows how to set this parameter to enable the account.
-Enabled $true
QUESTION 19
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain.
The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.
The domain contains a user named User1 and a global security group named Group1.
You reconfigure DC2 as a member server in the domain.
You need to add DC2 as the first domain controller in a new domain in the forest.
Which cmdlet should you run?
A.
B.
C.
D.
E.
F.
G.
H.

Add-AdPrincipalGroupMembership
Install-AddsDomainController
Install WindowsFeature
Install AddsDomain
Rename-AdObject
Set-AdAccountControl
Set-AdGroup
Set-User

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/hh974722.aspx
QUESTION 20
Your network contains an Active Directory domain named contoso.com. The domain contains a member
server named Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
You create an external virtual switch named Switch1. Switch1 has the following configurations:
- Connection type: External network
- Single-root I/O visualization (SR-IOV): Enabled
- Ten virtual machines connect to Switch1.
You need to ensure that all of the virtual machines that connect to Switch1 are isolated from the external
network and can connect to each other only. The solution must minimize network downtime for the virtual
machines.
What should you do?
A. Change the Connection type of Switch1 to Internal network.

B. Change the Connection type of Switch1 to Private network.


C. Remove Switch1 and recreate Switch1 as an internal network.
D. Remove Switch1 and recreate Switch1 as a private network.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Original answer is B.
But the correct answer is D.
You cannot change the type of vswitch from external to private when SR-IOV is enabled at vswitch creation ->
you need to recreate the vswitch.
QUESTION 21
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts a virtual machine
named VM1 that runs Windows Server 2012 R2. VM1 has several snapshots.
You need to modify the snapshot file location of VM1.
What should you do?
A.
B.
C.
D.

Right-click VM1, and then click Export...


Modify the Hyper-V settings.
Delete the existing snapshots, and then modify the settings of VM1.
Shut down VM1, and then modify the settings of VM1.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
In order for snapshot file location to be changed, all previous snapshots need to be deleted:

QUESTION 22
You have a server that runs a Server Core installation of Windows Server 2012 R2.
You need to change the DNS server used by IPv6.
What should you do?
A.
B.
C.
D.

From Windows PowerShell, run the Set-NetIpv6Protocol cmdlet.


From Sconfig, configure the Network Settings.
From Windows PowerShell, run the Set-DnsClientServerAddresscmdlet.
Run the sc.exe command and specify the config parameter.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/jj590768.aspx The Set-DnsClientServerAddress cmdlet sets one or
more IP addresses for DNS servers associated with an interface. This cmdlet statically adds DNS server
addresses to the interface. If this cmdlet is used to add DNS servers to the interface, then the DNS servers will
override any DHCP configuration for that interface.
PS C:\> Set-DnsClientServerAddress -InterfaceIndex 12 -ServerAddresses ("10.0.0.1","10.0.0.2")
QUESTION 23
You have a server named Server1 that runs Windows Server 2012 R2. You plan to create a storage pool that
will contain a new volume. You need to create a new 600-GB volume by using thin provisioning. The new
volume must use the parity layout.
What is the minimum number of 256-GB disks required for the storage pool?
A.
B.
C.
D.

2
3
4
5

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 24
You have a server named Server1 that runs Windows Server 2012 R2. You try to install the Microsoft .NET
Framework 3.5 Features feature on Server1, but the installation fails repeatedly.
You need to ensure that the feature can be installed on Server1.
What should you do?
A.
B.
C.
D.

Install the Web Server (IIS) server role.


Run the Add-WindowsPackagecmdlet.
Run the Add-AppxProvisionedPackagecmdlet.
Connect Server1 to the Internet.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The files needed are no longer available on the local Hard drive.
We need to connect the server to the Internet.
Note:
Starting with Windows Server 2012 R2 and Windows 8, the feature files for .NET Framework 3.5
(which includes .NET Framework 2.0 and .NET Framework 3.0) are not available on the local computer by
default. The files have been removed. Files for features that have been removed in a Features on Demand
configuration, along with feature files for .NET Framework 3.5, are available through Windows Update. By
default, if feature files are not available on the destination server that is running Windows Server 2012 R2
Preview or Windows Server 2012 R2, the installation process searches for the missing files by connecting to
Windows Update. You can override the default behavior by configuring a Group Policy setting or specifying an
alternate source path during installation, whether you are installing by using the Add Roles and Features

Wizard GUI or a command line.


QUESTION 25
Your network contains an Active Directory forest named contoso.com. The forest contains two domains named
contoso.com and child.contoso.com. The forest contains two domain controllers. The domain controllers are
configured as shown in the following table.

You need to ensure that DC2 can provide authoritative responses for queries to the contoso.com namespace.
What should you do?
A.
B.
C.
D.

On DC1, create a delegation.


On DC1, change the replication scope of the contoso.com zone.
On DC2, create a forwarder.
On DC2, modify the Zone Transfers settings.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
For DC1 to be able to provide authoritative responses to DNS queries the replication scope should be changed
accordingly so that it has the zone data for the contoso.com domain.
QUESTION 26
You are configuring the IPv6 network infrastructure for a branch office. The corporate network administrator
allocates the 2001:DB8:0:C000::/58 address space for use in the branch office. You need to identify the
maximum number of IPv6 subnets you can create.
How many IPv6 subnets should you identify?
A.
B.
C.
D.

32
64
128
1024

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
IPv6 has 128-bit (16-byte) source and destination IP addresses. Although 128 bits can express over 3.41038
possible combinations, the large address space of IPv6 has been designed for multiple levels of subnetting
and address allocation from the Internet backbone to the individual subnets within an organization.
http://technet.microsoft.com/en-us/library/dd379516%28v=WS.10%29.aspx
QUESTION 27
You have a print server named Server1.
You install a printer on Server1.

You share the printer as Printer1.


You need to configure Printer1 to be available only from 19:00 to 05:00 every day. Which settings from the
properties of Printer1 should you modify?
A.
B.
C.
D.
E.

Device Settings
Advanced
Security
Ports
Sharing

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
When navigating to the printer properties, the Properties tab is divided into several different tabs of which the
Advanced tab will give you access to the scheduling where you can configure the availability of the printer.

QUESTION 28
You have two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the DHCP
Server server role installed.
You need to create an IPv6 reservation for Server2.
Which two values should you obtain from Server2? (Each correct answer presents part of the solution. Choose
two.)

A.
B.
C.
D.
E.

the hardware ID
the DHCPv6 unique identifier
the DHCPv6 identity association ID
the SMSBIOS GUID
the MAC address

Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The Add-DhcpServerv6Reservation cmdlet reserves a specified IPv6 address for the client identified by the
specified Dynamic Host Configuration Protocol (DHCP) v6 unique identifier (ID) (DUID) and identity
association ID (IAID).
http://technet.microsoft.com/en-us/library/jj590730.aspx
QUESTION 29
Your network contains an Active Directory domain named contoso.com. The domain contains two member
servers named Server1 and Server2 that run Windows Server 2012 R2.
You log on to Server1.
You need to retrieve a list of the active TCP connections on Server2.
Which command should you run from Server1?
A.
B.
C.
D.

winrm get server2


dsquery * -scope base -attrip,server2
winrs -r:server2netstat
netstat> server2

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://msdn.microsoft.com/en-us/library/aa384291(v=vs.85).aspx This command line tool enables
administrators to remotely execute most Cmd.exe commands using the WS-Management protocol.

QUESTION 30
You have a server named Server1 that has the Print and Document Services server role installed. You need to
provide users with the ability to manage print jobs on Server1 by using a web browser.
What should you do?
A.
B.
C.
D.

Start the Computer Browser service and set the service to start automatically.
Install the LPD Service role service.
Install the Internet Printing role service.
Start the Printer Extensions and Notifications service and set the service to start automatically.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Internet printing makes it possible for computers running Windows Server 2008 to use printers located
anywhere in the world by sending print jobs using Hypertext Transfer Protocol (HTTP). http://
technet.microsoft.com/en-us/library/cc731368(v=ws.10).aspx
QUESTION 31
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1. Server1 runs Windows Server 2012 R2. You plan to create a shared folder. The shared folder will
have a quota limit. You discover that when you run the New Share Wizard, you cannot select the SMB Share
Advanced option.
You need to ensure that you can use SMB Share - Advanced to create the new share. What should you do on
Server1 before you run the New Share Wizard?
A.
B.
C.
D.

Configure the Advanced system settings.


Run the Install-WindowsFeaturecmdlet.
Run the Set-SmbSharecmdlet.
Install the Share and Storage Management tool.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:

Install-windowsfeature -name fs-resource-manager -includemanagementtools Installs one or more Windows


Server roles, role services, or features on either the local or a specified remote server that is running Windows
Server 2012 R2. This cmdlet is equivalent to and replaces Add- WindowsFeature, the cmdlet that was used to
install roles, role services, and features in Windows Server 2008 R2.
http://www.c-sharpcorner.com/UploadFile/cd7c2e/how-to-install-the-file-server-resource- manager-in-windowss/
QUESTION 32
Your network contains two Active Directory forests named contoso.com and adatum.com. All servers run
Windows Server 2012 R2. A one-way external trust exists between contoso.com and adatum.com.
Adatum.com contains a universal group named Group1. You need to prevent Group1 from being used to
provide access to the resources in contoso.com.
What should you do?
A.
B.
C.
D.

Change the scope of Group1 to domain local.


Modify the Allowed to Authenticate permissions in adatum.com.
Enable SID quarantine on the trust between contoso.com and adatum.com.
Modify the Allowed to Authenticate permissions in contoso.com.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
* Accounts that require access to the customer Active Directory will be granted a special right called Allowed to
Authenticate. This right is then applied to computer objects (Active Directory domain controllers and AD RMS
servers) within the customer Active Directory to which the account needs access.
* For users in a trusted Windows Server 2008 or Windows Server 2003 domain or forest to be able to access
resources in a trusting Windows Server 2008 or Windows Server 2003 domain or forest where the trust
authentication setting has been set to selective authentication, each user must be explicitly granted the
Allowed to Authenticate permission on the security descriptor of the computer objects (resource computers)
that reside in the trusting domain or forest. http://technet.microsoft.com/en-us/library/cc816733(v=ws.10).aspx
QUESTION 33
Your network contains an Active Directory domain named contoso.com. The domain contains 100 user
accounts that reside in an organizational unit (OU) named OU1. You need to ensure that a user named User1
can link and unlink Group Policy objects (GPOs) to OU1. The solution must minimize the number of
permissions assigned to User1.
What should you do?
A.
B.
C.
D.

Add User1 to the Group Policy Creator Owners group.


Run the Set-GPPermissioncmdiet.
Modify the permission on the \\Contoso.com\SYSVOL\Contoso.com\Policies folder.
Run the Delegation of Control Wizard on OU1.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.howtogeek.com/50166/using-the-delegation-of-control-wizard-to-assign-permissions- in-server2008/

QUESTION 34
Your network contains an Active Directory forest named contoso.com. The forest contains two domains named
contoso.com and child.contoso.com and two sites named Site1 and Site2.
The domains and the sites are configured as shown in following table.

When the link between Site1 and Site2 fails, users fail to log on to Site2. You need to identify what prevents
the users in Site2 from logging on to the child.contoso.com domain.
What should you identify?
A.
B.
C.
D.

the placement of the global catalog server


the placement of the PDC emulator
the placement of the infrastructure master
the placement of the domain naming master

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/dd391870(v=ws.10).aspx The PDC emulator processes password
changes from earlier-version clients and other domain controllers on a best-effort basis; handles password
authentication requests involving passwords that have recently changed and not yet been replicated
throughout the domain; and, by default, synchronizes time. If this domain controller cannot connect to the PDC
emulator, this domain controller cannot process authentication requests, it may not be able to synchronize
time, and password updates cannot be replicated to it.
http://technet.microsoft.com/en-us/library/cc773108(v=ws.10).aspx The PDC emulator master processes
password changes from client computers and replicates these updates to all domain controllers throughout the
domain. At any time, there can be only one domain controller acting as the PDC emulator master in each
domain in the forest.
QUESTION 35
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All
servers runs Windows Server 2012 R2.The domain contains two domain controllers named DC1 and DC2.
Both domain controllers are virtual machines on a HyperV host. You plan to create a cloned domain controller
named DC3 from an image of DC1.
You need to ensure that you can clone DC1.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
E.

Add the computer account of DC1 to the Cloneable Domain Controllers group.
Create a DCCIoneConfig.xml file on DC1.
Add the computer account of DC3 to the Cloneable Domain Controllers group.
Run the Enable-AdOptionalFeaturecmdlet.
Modify the contents of the DefaultDCCIoneAllowList.xml file on DC1.

Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A: Cloneable Domain Controllers Group There's a new group in town. It's called Cloneable Domain Controllers
and you can find it in the Users container. Membership in this group dictates whether a DC can or cannot be
cloned. This group has some permissions set on the domain head that should not be removed. Removing
these permissions will cause cloning to fail. Also, as a best practice, DCs shouldn't be added to the group until
you plan to clone and DCs should be removed from the group once cloning is complete. Cloned DCs will also
end up in the Cloneable Domain Controllers group.
B: DCCloneConfig.xml
There's one key difference between a cloned DC and a DC that is being restored to a previous snapshot:
DCCloneConfig.XML.
DCCloneConfig.xml is an XML configuration file that contains all of the settings the cloned DC will take when it
boots. This includes network settings, DNS, WINS, AD site name, new DC name and more. This file can be
generated in a few different ways.
The New-ADDCCloneConfigcmdlet in PowerShell
By hand with an XML editor
By editing an existing config file, again with an XML editor. Reference: Virtual Domain Controller Cloning in
Windows Server 2012
QUESTION 36
Your network contains an Active Directory forest.
The forest contains two domains named contoso.com and corp.contoso.com. All domain controllers run

Windows Server 2012 R2 and are configured as global catalog servers. The corp.contoso.com domain
contains a domain controller named DC1.
You need to disable the global catalog on DC1.
What should you do?
A.
B.
C.
D.

From Active Directory Users and Computers, modify the properties of the DC1 computer account.
From Active Directory Administrative Center, modify the properties of the DC1 computer account.
From Active Directory Sites and Services, modify the NTDS Settings of the DC1 server object.
From Active Directory Domains and Trusts, modify the properties of the corp.contoso.com domain.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc755257.aspx To add or remove the global catalog
Open Active Directory Sites and Services. To open Active Directory Sites and Services, click Start , click
Administrative Tools , and then click Active Directory Sites and Services . To open Active Directory Sites and
Services in Windows Server 2012, click Start , type dssite.msc .
In the console tree, click the server object to which you want to add the global catalog or from which you want
to remove the global catalog.
Where?
Active Directory Sites and Services\Sites\SiteName\Servers In the details pane, right-click NTDS Settings of
the selected server object, and then click Properties .
Select the Global Catalog check box to add the global catalog, or clear the check box to remove the global
catalog.
QUESTION 37
Your network contains an Active Directory domain named contoso.com. Your company hires 500 temporary
employees for the summer. The human resources department gives you a Microsoft Excel document that
contains a list of the temporary employees. You need to automate the creation of user accounts for the 500
temporary employees.
Which tool or tools should you use?
A.
B.
C.
D.

The Set-ADUsercmdlet and the Add-Member cmdlet


The Import-CSV cmdlet and the New-ADUsercmdlet
ADSI Edit
Active Directory Users and Computers

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/ee176874.aspx The CSVDE is a command-line utility that can create
new AD DS objects by importing information from a comma-separated value (.csv) file. This would be the least
amount of administrative effort in this case especially considering that these would be temporary employees.
QUESTION 38
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 installed.
You have been instructed to modify the name of the local Administrator account on all L2P.com workstations.
You want to achieve this using as little administrative effort as possible.
Which of the following actions should you take?
You should consider configuring the Security Options settings via the Group Policy

A. You should consider configuring the Security Options settings via the Group Policy Management Console
(GPMC).
B. You should consider navigating to Local Users and Groups via Computer
C. You should consider configuring the replication settings.
D. You should consider navigating to Local Users and Groups via Computer Management on each
workstation.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Rename administrator account policy setting determines whether a different account name is associated with
the security identifier (SID) for the Administrator account.
Because the Administrator account exists on all Windows server versions, renaming the account makes it
slightly more difficult for attackers to guess this user name and password combination. By default, the built-in
Administrator account cannot be locked out no matter how many times a malicious user might use a bad
password. This makes the Administrator account a popular target for brute-force password-guessing attacks.
The value of this countermeasure is lessened because this account has a well-known SID and there are nonMicrosoft tools that allow you to initiate a brute-force attack over the network by specifying the SID rather than
the account name. This means that even if you have renamed the Administrator account, a malicious user
could start a brute-force attack by using the SID.
Rename the Administrator account by specifying a value for the Accounts: Rename administrator account
policy setting.
Location: GPO_name\Computer Configuration\Windows Settings\Security Settings\Local Policies\Security
Options
http://technet.microsoft.com/en-us/library/jj852273%28v=ws.10%29.aspx http://windowsitpro.com/group-policy/
securing-administrator-account
QUESTION 39
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1. Server1 runs Windows Server 2012 R2. An administrator creates a security template named
Template1.
You need to Apply Template1 to Server1.
Which snap-in should you use?
A.
B.
C.
D.

Security Templates
Authorization Manager
Security Configuration and Analysis
Resultant Set of Policy

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The Security Configuration and Analysis tool contains the Local Security Policy snap-in that is used to apply
templates.
http://technet.microsoft.com/en-us/library/bb742512.aspx http://technet.microsoft.com/en-us/library/cc739442%
28v=WS.10%29.aspx
QUESTION 40
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain.

The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2. The
domain contains a user named User1 and three global security groups named Group1, Group2 and, Group3.
You need to add User1 to Group1, Group2, and Group3.
Which cmdlet should you run?
A.
B.
C.
D.
E.
F.
G.
H.

Add-AdPrincipalGroupMembership
Install- AddsDomainController
Install- WindowsFeature
Install-AddsDomain
Rename-AdObject
Set-AdAccountControl
Set-AdGroup
Set-User

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/ee617203.aspx The Add-ADPrincipalGroupMembership cmdlet adds
a user, group, service account, or computer as a new member to one or more Active Directory groups.
QUESTION 41
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain.
The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.
The domain contains a user named User1 and a global security group named Group1. You need to ensure
that User1 can manage the group membership of Group1. The solution must minimize the number of
permissions assigned to User1.
Which cmdlet should you run?
A.
B.
C.
D.
E.
F.
G.
H.

Add-AdPrincipalGroupMembership
Install- AddsDomainController
Install- WindowsFeature
Install-AddsDomain
Rename-AdObject
Set-AdAccountControl
Set-AdGroup
Set-User

Correct Answer: G
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/ee617199.aspx The Set-ADGroup cmdlet modifies the properties of
an Active Directory group. You can modify commonly used property values by using the cmdlet parameters.
QUESTION 42
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain.
The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2.
The domain contains a user named User1 and a global security group named Group1. You need to prevent
User1 from changing his password. The solution must minimize administrative effort.
Which cmdlet should you run?

A.
B.
C.
D.
E.
F.
G.
H.

Add-AdPrincipalGroupMembership
Install- AddsDomainController
Install- WindowsFeature
Install-AddsDomain
Rename-AdObject
Set-AdAccountControl
Set-AdGroup
Set-User

Correct Answer: F
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/ee617249.aspx Set-ADAccountControl
The Set-ADAccountControl cmdlet modifies the user account control (UAC) values for an Active Directory user
or computer account. UAC values are represented by cmdlet parameters.
CannotChangePassword
Modifies the ability of an account to change its password. To disallow password change by the account set this
to $true.. This parameter changes the Boolean value of the CannotChangePassword property of an account.
The following example shows how to specify the PasswordCannotChange parameter.
-CannotChangePassword $false
QUESTION 43
You have a Hyper-V host named Host1 that connects to a SAN by using a hardware Fibre Channel adapter.
Host1 contains two virtual machines named VM1 and VM2. You need to provide VM1 with direct access to the
SAN. VM2 must not require access to the SAN. Which two configurations should you perform? (Each correct
answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
E.

On VM1, configure a Fibre Channel adapter.


On Host1, configure a new virtual switch.
On VM1, add a network adapter.
On Host1, configure a new Virtual Fibre Channel SAN.
On Host1, modify the Hyper-V settings.

Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Step 1:
D: Building a Virtual SAN
The process of setting up virtual Fibre Channel starts with building a virtual SAN. The easiest way to
accomplish this is to open the Hyper-V Manager, right click on the listing for your Hyper-V server in the console
tree, and then choose the Virtual SAN Manager command from the shortcut menu.
Step 2:
A: Once you have created a virtual SAN, the next step in the process is to link a virtual machine to the virtual
SAN. To do so, right click on the virtual machine for which you want to provide Fibre Channel connectivity and
select the Settings command from the resulting shortcut menu. Next, select the Add Hardware container, as
shown in the figure above, and then select the Fibre Channel Adapter option from the list of available

hardware. Etc.
Note:
* Virtual Fibre Channel for Hyper-V (also referred to as Synthetic Fibre Channel) provides VM guest operating
systemswith direct access to a Fibre Channel SAN by using a standard World Wide Name (WWN) associated
with a virtual machine
QUESTION 44
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the HyperV server role
installed. Server1 has 8 GB of RAM. Server1 hosts five virtual machines that run Windows Server 2012 R2.
The settings of a virtual machine named Server3 are configured as shown in the exhibit. (Click the Exhibit
button.)

You need to ensure that when Server1 restarts, Server3 automatically resumes without intervention.
The solution must prevent data loss.
Which settings should you modify?
A.
B.
C.
D.

BIOS
Automatic Start Action
Automatic Stop Action
Integration Services

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.altaro.com/hyper-v/hyper-v-automatic-start-and-stop-action/

QUESTION 45
You have a laptop named Computer1. Computer1 runs Windows 8 Enterprise. Computer1 has a wired
network adapter and a wireless network adapter. Computer1 connects to a wireless network named Network1.
For testing purposes, you install Windows Server 2012 R2 on Computer1 as a second operating system.
You install the drivers for the wireless network adapter. You need to ensure that you can connect to Network1
from Windows Server 2012 R2.
What should you do?
A.
B.
C.
D.

From a local Group Policy object (GPO), configure the Wireless Network (IEEE 802.11) Policies settings.
From a local Group Policy object (GPO), configure the settings of Windows Connection Manager.
From Server Manager, install the Wireless LAN Service feature.
Restart the WLAN AutoConfig service.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/hh994698.aspx The Wireless LAN service is a feature in Windows
Server 2012 R2 that you can use to enable the wireless WLAN AutoConfig service, and to configure the
WLAN AutoConfig service for automatic startup. Once enabled, the WLAN AutoConfig service dynamically
selects which wireless network the computer automatically connects to, and configures the necessary settings
on the wireless network adapter. This includes automatically selecting and connecting to a more preferred
wireless network when one becomes available.
To enable the Wireless LAN Service
In Server Manager Dashboard, click Manage, and then click Add Roles and Features. The Add Roles and
Features Wizard opens.
Click Next. In Select installation type, select Role-based or feature-based installation, and then click Next.
In Select destination server, enable Select a server from the server pool, and in Server Pool, select the server

for which you want to enable the Wireless LAN Service, and then click Next.
In Select server roles, click Next.
In Select Server features, in Features, select Wireless LAN Service, and then click Next.
QUESTION 46
Your network contains an Active Directory domain named contoso.com. You install Windows Server 2012 on a
new server named Server1 and you join Server1 to the domain.
You need to ensure that you can view processor usage and memory usage information in Server
Manager.
What should you do?
A.
B.
C.
D.

From Server Manager, click Configure Performance Alerts.


From Server Manager, click Start Performance Counters.
From Performance Monitor, start the System Performance Data Collector Set (DCS).
From Performance Monitor, create a Data Collector Set (DCS).

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:

QUESTION 47
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain.
The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2. The
domain contains a user named User1 and a global security group named Group1. You need to modify the
SAM account name of Group1.
Which cmdlet should you run?
A. Add-AdPrincipalGroupMembership
B. Install AddsDomainControNer

C.
D.
E.
F.
G.
H.

Install WindowsFeature
Install AddsDomain
Rename-AdObject
Set-AdAccountControl
Set-AdGroup
Set-User

Correct Answer: G
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The Rename-ADObject cmdlet renames an Active Directory object. This cmdlet sets the Name property of an
Active Directory object that has an LDAP Display Name (ldapDisplayName) of "name". To modify the given
name, surname and other name of a user, use the Set-ADUser cmdlet. To modify the Security Accounts
Manager (SAM) account name of a user, computer, or group, use the Set-ADUser, Set-ADComputer or SetADGroup cmdlet.

QUESTION 48
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts a virtual machine
named VM1 that runs Windows Server 2012 R2. VM1 has several snapshots.
You need to modify the snapshot file location of VM1.
What should you do?
A.
B.
C.
D.

Right-click VM1, and then click Export...


Shut down VM1, and then modify the settings of VM1.
Delete the existing snapshots, and then modify the settings of VM1.
Pause VM1, and then modify the settings of VM1.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://doquent.wordpress.com/2012/09/02/relocating-a-hyper-v-vm-folder/

It is not A, watch this: http://www.youtube.com/watch?v=YvwtpPQk0Cs


QUESTION 49
You have a server named Server1 that runs Windows Server 2012 R2. A network technician installs a new

disk on Server1 and creates a new volume. The properties of the new volume are shown in the exhibit. (Click
the Exhibit button.)

You need to ensure that you can enable NTFS disk quotas for volume D.
What should you do first?
A.
B.
C.
D.

Install the File Server Resource Manager role service.


Format volume D.
Run the convert.exe command.
Convert the disk to a dynamic disk.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://blogs.technet.com/b/askpfeplat/archive/2013/01/02/windows-server-2012-does-refs- replace-ntfs-whenshould-i-use-it.aspx
REFS to NTFS requires format not convert.exe

QUESTION 50
You have a file server named File1 that runs Windows Server 2012 R2. File1 contains a shared folder named
Share1. Share1 contains an Application named SalesApp1.exe. The NTFS permissions for Share1 are shown
in the following table.

The members of L_Sales discover that they cannot add files to Share1.
Domain users can run SalesApp1.exe successfully.
You need to ensure that the members of L_Sales can add files to Share1.
What should you do?
A.
B.
C.
D.

Add the Domain Users group to L_Sales.


Add L_Sales to the Domain Users group.
Edit the Share permissions.
Edit the NTFS permissions.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.techrepublic.com/article/windows-101-know-the-basics-about-ntfs-permissions/ The least restrictive
permission applies here, so the users from L_sales have read & execute, write... in order to add files they need
the NTFS permission called MODIFY.
Based on NTFS permissions:
Modify: Users can view and modify files and file properties, including deleting and adding files to a directory or
file properties to a file.
QUESTION 51
Your network contains an Active Directory domain named contoso.com. The domain contains two servers
named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Group Policy Management
feature installed. Server2 has the Print and Document Services server role installed. On Server2, you open
Print Management and you deploy a printer named Printer1 by using a Group Policy object (GPO) named
GPO1.
When you open GPO1 on Server1, you discover that the Deployed Printers node does not appear.
You need to view the Deployed Printers node in GPO1.
What should you do?

A.
B.
C.
D.

On Server1, modify the Group Policy filtering options of GPO1.


On a domain controller, create a Group Policy central store.
On Server2, install the Group Policy Management feature.
On Server1, configure the security filtering of GPO1.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Pre-Requisites

To use Group Policy for printer deployment you will need to have a Windows Active Directory domain, and this
article assumes that your Domain Controller is a Windows 2008 R2 Server. You will also need the Print
Services role installed on a server (can be on your DC), and you will be using the Print Management and
Group Policy Management consoles to configure the various settings. Its assumed that you have already
followed Part One and have one or more printers shared on your server with the necessary drivers, ready to
deploy to your client computers. The wording does not say if GPMC is installed on server 2, so I can only think
that it does not deploy the GPO because it had no GPMC on server 2..
GPMC is not installed by default:
http://pipe2text.com/?page_id=1591
http://technet.microsoft.com/en-us/library/cc725932.aspx
QUESTION 52
Your network contains an Active Directory domain named contoso.com. All of the App1ocker policy settings for
the member servers are configured in a Group Policy object (GPO) named GPO1.
A member server named Server1 runs Windows Server 2012 R2. On Server1, you test a new set of
AppLocker policy settings by using a local computer policy. You need to merge the local AppLocker policy
settings from Server1 into the AppLocker policy settings of GPO1.
What should you do?
A. From Local Group Policy Editor on Server1, exportan .xml file. Import the .xml file by using Group Policy
Management Editor.
B. From Local Group Policy Editor on Server1, exportan .inf file. Import the .inf file by using Group Policy
Management Editor.
C. From Server1, run the Set-AppLockerPolicy cmdlet.
D. From Server1, run the New-AppLockerPolicy cmdlet.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/ee791816(v=ws.10).aspx The Set-AppLockerPolicy cmdlet sets the
specified Group Policy Object (GPO) to contain the specified AppLocker policy. If no Lightweight Directory
Access Protocol (LDAP) is specified, the local GPO is the default. When the Merge parameter is used, rules in
the specified AppLocker policy will be merged with the AppLocker rules in the target GPO specified in the
LDAP path. The merging of policies will remove rules with duplicate rule IDs, and the enforcement setting
specified by the AppLocker policy in the target GPO will be preserved. If the Merge parameter is not specified,
then the new policy will overwrite the existing policy.
QUESTION 53
Your network contains an Active Directory domain named contoso.com. You have a Group Policy object
(GPO) named GP1 that is linked to the domain. GP1 contains a software restriction policy that blocks an
Application named App1. You have a workgroup computer named Computer1 that runs Windows 8. A local
Group Policy on
Get
Computer1 contains an Application control policy that allows App1.
You join Computer1 to the domain.
You need to prevent App1 from running on Computer1.
What should you do?
A.
B.
C.
D.

From Group Policy Management, add an Application control policy to GP1.


From Group Policy Management, enable the Enforced option on GP1.
In the local Group Policy of Computer1, configure a software restriction policy.
From Computer1, run gpupdate /force.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
AppLocker policies take precedence over policies generated by SRP on computers that are running an
operating system that supports AppLocker
AppLocker policies in the GPO are applied, and they supersede the policies generated by SRP in the GPO
and local AppLocker policies or policies generated by SRP. http://technet.microsoft.com/en-us/library/
ee791851.aspx
QUESTION 54
Your network contains an Active Directory domain named contoso.com. The domain contains an Application
server named Server1. Server1 runs Windows Server 2012 R2. Server1 is configured as an FTP server. Client
computers use an FTP Application named App1.exe. App1.exe uses TCP port 21 as the control port and
dynamically requests a data port. On Server1, you create a firewall rule to allow connections on TCP port 21.
You need to configure Server1 to support the client connections from App1.exe. What should you do?
A.
B.
C.
D.

Run netsh firewall addportopening TCP 21 dynamicftp.


Create a tunnel connection security rule.
Create an outbound firewall rule to allow App1.exe.
Run netshadvfirewall set global statefulftp enable.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc771920%28v=ws.10%29.aspx#BKMK_set_2a The netsh firewall
context is supplied only for backward compatibility. We recommend that you do not use this context on a
computer that is running Windows Vista or a later version of Windows In the netsh advfirewall firewall context,
the add command only has one variation, the add rule command.
Netsh advfirewall set global statefulftp:
Configures how Windows Firewall with Advanced Security handles FTP traffic that uses an initial connection
on one port to request a data connection on a different port. When statefulftp is enabled, the firewall examines
the PORT and PASV requests for these other port numbers and then allows the corresponding data
connection to the port number that was requested.
Syntax
set global statefulftp { enable | disable | notconfigured } Parameters
statefulftp can be set to one of the following values:
enable The firewall tracks the port numbers specified in PORT command requests and in the responses to
PASV requests, and then allows the incoming FTP data traffic entering on the requested port number.
disable
This is the default value. The firewall does not track outgoing PORT commands or PASV responses, and so
incoming data connections on the PORT or PASV requested port is blocked as an unsolicited incoming
connection.
notconfigured
Valid only when netsh is configuring a GPO by using the set store command.
QUESTION 55
Your company has a main office and four branch offices. The main office contains a server named Server1
that runs Windows Server 2012 R2. The IP configuration of each office is configured as shown in the following
table.

You need to add a single static route on Server1 to ensure that Server1 can communicate with the hosts on all
of the subnets.
Which command should you run?
A.
B.
C.
D.

route.exe add -p 192.168.0.0 mask 255.255.248.0 172.31.255.254


route.exe add -p 192.168.12.0 mask 255.255.252.0 172.31.255.254
route.exe add -p 192.168.8.0 mask 255.255.252.0 172.31.255.254
route.exe add -p 192.168.12.0 mask 255.255.255.0 172.31.255.254

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 56
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 R2 installed.
You have created and linked a new Group Policy object (GPO) to an organizational unit (OU), named
L2PServ, which host the computer accounts for servers in the L2P.com domain. You have been tasked with
adding a group to a local group on all servers in the L2P.com domain. This group should not, however, be
removed from the local group.
Which of the following actions should you take?
A.
B.
C.
D.

You should consider adding a restricted group.


You should consider adding a global group.
You should consider adding a user group.
You should consider adding a server group.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Restricted groups in Group policies are a simple way of delegating permissions or group membership centrally
to any domain computer or server. Using restricted groups it is easier to enforce the lowest possible
permissions to any given account. Computer Configuration\Windows Settings\Security Settings\Restricted
Groups Restricted groups allow an administrator to define two properties for security-sensitive groups (that is,
"restricted" groups). The two properties are Members and Member Of . The Members list defines who should
and should not belong to the restricted group. The Member Of list specifies which other groups the restricted
group should belong to. When a restricted Group Policy is enforced, any current member of a restricted group
that is not on the Members list is removed. Any user on the Members list which is not currently a member of
the restricted group is added. The Restricted Groups folder is available only in Group Policy objects associated
with domains, OUs, and sites. The Restricted Groups folder does not appear in the Local Computer Policy

object. If a Restricted Group is defined such that it has no members (that is, the Members list is empty), then
all members of the group are removed when the policy is enforced on the system. If the Member Of list is
empty no changes are made to any groups that the restricted group belongs to. In short, an empty Members
list means the restricted group should have no members while an empty Member Of list means "don't care"
what groups the restricted group belongs to.

http://technet.microsoft.com/en-us/library/cc957640.aspx
QUESTION 57
Your network contains two Active Directory forests named contoso.com and adatum.com. Each forest contains
one domain. A two-way forest trust exists between the forests. The forests use the address spaces shown in
the following table.

From a computer in the contoso.com domain, you can perform reverse lookups for the servers in the
contoso.com domain, but you cannot perform reverse lookups for the servers in the adatum.com domain. From
a computer in the adatum.com domain, you can perform reverse lookups for the servers in both domains.
You need to ensure that you can perform reverse lookups for the servers in the adatum.com domain from the
computers in the contoso.com domain.
What should you create?

A.
B.
C.
D.

a delegation
a trust point
a conditional forwarder
a GlobalNames zone

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc757172(v=ws.10).aspx Conditional forwarders are DNS servers
that only forward queries for specific domain names. Instead of forwarding all queries it cannot resolve locally
to a forwarder, a conditional forwarder is configured to forward a query to specific forwarders based on the
domain name contained in the query. Forwarding according to domain names improves conventional
forwarding by adding a name-based condition to the forwarding process.
The conditional forwarder setting for a DNS server consists of the following:
The domain names for which the DNS server will forward queries. One or more DNS server IP addresses for
each domain name specified. When a DNS client or server performs a query operation against a DNS server,
the DNS server looks to see if the query can be resolved using its own zone data or the data stored in its
cache. If the DNS server is configured to forward for the domain name designated in the query, then the query
is forwarded to the IP address of a forwarder associated with the domain name. For example, in the following
figure, each of the queries for the domain names is forwarded to a DNS server associated with the domain
name.
QUESTION 58
Your network contains an Active Directory domain named contoso.com. The domain contains two servers
named Server1 and Server2 that run Windows Server 2012 R2.
Server2 establishes an IPSec connection to Server1.
You need to view which authentication method was used to establish the initial IPSec connection.
What should you do?
A.
B.
C.
D.

From Windows Firewall with Advanced Security, view the quick mode security association.
From Event Viewer, search the Application Log for events that have an ID of 1704.
From Event Viewer, search the Security Log for events that have an ID of 4672.
From Windows Firewall with Advanced Security, view the main mode security association.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:

http://technet.microsoft.com/en-us/library/dd448497(v=ws.10).aspx Main mode negotiation establishes a


secure channel between two computers by determining a set of cryptographic protection suites, exchanging
keying material to establish a shared secret key, and authenticating computer and user identities. A security
association (SA) is the information maintained about that secure channel on the local computer so that it can
use the information for future network traffic to the remote computer. You can monitor main mode SAs for
information like which peers are currently connected to this computer and which protection suite was used to
form the SA.
To get to this view
In the Windows Firewall with Advanced Security MMC snap-in, expand Monitoring, expand Security
Associations, and then click Main Mode.
The following information is available in the table view of all main mode SAs. To see the information for a
single main mode SA, double-click the SA in the list.
Main mode SA information
You can add, remove, reorder, and sort by these columns in the Results pane:
Local Address: The local computer IP address.
Remote Address: The remote computer or peer IP address.
1st Authentication Method: The authentication method used to create the SA. 1st Authentication Local ID:: The
authenticated identity of the local computer used in first authentication.
1st Authentication Remote ID: The authenticated identity of the remote computer used in first authentication.
2nd Authentication Method: The authentication method used in the SA. 2nd Authentication Local ID:: The
authenticated identity of the local computer used in second authentication.
2nd Authentication Remote ID: The authenticated identity of the remote computer used in second
authentication.
Encryption: The encryption method used by the SA to secure quick mode key exchanges. Integrity: The data
integrity method used by the SA to secure quick mode key exchanges. Key Exchange: The Diffie-Hellman
group used to create the main mode SA.
QUESTION 59
Your network contains an Active Directory domain named contoso.com. The domain contains an Application
server named Server1. Server1 runs Windows Server 2012 R2. Server1 is configured as an FTP server. Client
computers use an FTP Application named App1.exe. App1.exe uses TCP port 21 as the control port and
dynamically requests a data port. On Server1, you create a firewall rule to allow connections on TCP port 21.
You need to configure Server1 to support the client connections from App1.exe. What should you do?
A.
B.
C.
D.

Run netshadvfirewall set global statefulftp enable.


Create an inbound firewall rule to allow App1.exe.
Create a tunnel connection security rule.
Run Set-NetFirewallRule -DisplayNameDynamicFTP -Profile Domain

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc771920%28v=ws.10%29.aspx#BKMK_set_2a The netsh firewall
context is supplied only for backward compatibility. We recommend that you do not use this context on a
computer that is running Windows Vista or a later version of Windows In the netsh advfirewall firewall context,
the add command only has one variation, the add rule command.
Netsh advfirewall set global statefulftp:
Configures how Windows Firewall with Advanced Security handles FTP traffic that uses an initial connection
on one port to request a data connection on a different port. When statefulftp is enabled, the firewall examines
the PORT and PASV requests for these other port numbers and then allows the corresponding data
connection to the port number that was requested.
Syntax
set global statefulftp { enable | disable | notconfigured } Parameters

statefulftp can be set to one of the following values:

enable
The firewall tracks the port numbers specified in PORT command requests and in the responses to PASV
requests, and then allows the incoming FTP data traffic entering on the requested port number.
disable
This is the default value. The firewall does not track outgoing PORT commands or PASV responses, and so
incoming data connections on the PORT or PASV requested port is blocked as an unsolicited incoming
connection.
notconfigured
Valid only when netsh is configuring a GPO by using the set store command.
QUESTION 60
Your network contains an Active Directory domain named contoso.com. You have a Group Policy object
(GPO) named GPO1 that contains several user settings. GPO1 is linked to an organizational unit (OU) named
OU1.
The help desk reports that GPO1 Applies to only some of the users in OU1. You open Group Policy
Management as shown in the exhibit. (Click the Exhibit button.)

You need to configure GPO1 to Apply to all of the users in OU1.


What should you do?
A.
B.
C.
D.

Modify the Security settings of GPO1.


Disable Block Inheritance on OU1.
Modify the GPO status of GPO1.
Enforce GPO1.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc739343(v=ws.10).aspx
QUESTION 61
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 R2 installed.
You have configured a server, named L2P-SR07, as a VPN server. You are required to configure new firewall
rules for workstation connections. You want to achieve this using the least amount of administrative effort.
Which of the following actions should you take?
A.
B.
C.
D.

You should consider making use of the Enable-NetFirewallRule cmdlet.


You should consider making use of the New-NetFirewallRule cmdlet.
You should consider making use of dism.exe from the command prompt.
You should consider making use of dsadd.exe from the command prompt.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
New-NetFirewallRule - Creates a new inbound or outbound firewall rule and adds the rule to the target
computer.
You can't Enable what doesn't exist yet... you must use New-NetFirewallRule

http://technet.microsoft.com/en-us/library/jj554908%28v=wps.620%29.aspx http://blogs.technet.com/b/
heyscriptingguy/archive/2012/11/13/use-powershell-to-create-new- windows- firewall-rules.aspx
QUESTION 62
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1. Server1 runs Windows Server 2012 and has the HyperV server role installed. On Server1, an
administrator creates a virtual machine named VM1. A user named User1 is the member of the local
Administrators group on Server1. User1 attempts to modify the settings of VM1 as shown in the following
exhibit. (Click the Exhibit button.)

You need to ensure that User1 can modify the settings of VM1 by running the Set-Vm cmdlet.
What should you instruct User1 to do?
A.
B.
C.
D.

Import the Hyper-V module.


Install the Integration Services on VM1.
Run Windows PowerShell with elevated privileges.
Modify the membership of the local Hyper-V Administrators group.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
You can only use the PowerShell snap-in to modify the VM settings with the vmcmdlets when you are an
Administrator.
Thus best practices dictate that User1 run the Powershell with elevated privileges. http://
technet.microsoft.com/en-us/library/jj713439.aspx
QUESTION 63
You have 3 server named Server1. Server1 runs a Server Core installation of Windows Server 2012 R2. The
local area connection on Server1 has the following configuration:
IP address: 10.1.1.1
- Subnet mask: 255.255.240.0
- Default gateway: 10.1.1.254
- Preferred DNS server: <none>
The network contains a DNS server that has an IPv4 address of 10.1.1.200. You need to configure Server1 to
use 10.1.1.200 as the preferred DNS server. The solution must not change any other settings on Server1.
Which command should you run?
A.
B.
C.
D.

sconfig.cmd
net.exe
Set-NetIPInterface
netsh.exe

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
In Windows Server 2012 R2, you can use the Server Configuration tool (Sconfig.cmd) to configure and
manage several common aspects of Server Core installations. Network settings You can configure the IP
address to be assigned automatically by a DHCP Server or you can assign a static IP address manually. This
option allows you to configure DNS Server settings for the server as well.

Sconfig.cmd interface
QUESTION 64
You have a server named Server1 that runs Windows Server 2012 R2. On Server1, you open Computer
Management as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that you can create a 3-TB volume on Disk 1. What should you do first?
A. Create a storage pool.
B. Convert the disk to a GPT disk.
C. Create a VHD, and then attach the VHD.

D. Convert the disk to a dynamic disk.


Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The exhibit shows Disk1 to be a basic disk.
The disk must be GPT since GPT disks allows for partitioning. http://msdn.microsoft.com/en-us/library/
windows/hardware/gg463525.aspx

QUESTION 65
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 R2 installed.
L2P.com has a domain controller, named L2P-DC01.
You have been instructed to make sure that the Group Policy Administrative Templates are available centrally.
Which of the following actions should you take?
A. You should consider copying the policies folder to the PolicyDefinitions folder in the L2P.com domain's
SYSVOL folder.
B. You should consider copying the PolicyDefinitions folder to the policies folder in the L2P.com domain's
SYSVOL folder.
C. You should consider copying the PolicyDefinitions folder to the policies folder in the L2P.com domain's
systemroot folder.
D. You should consider copying the PolicyDefinitions folder to the policies folder in the L2P.com domain's
logonserver folder.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Get Latest & Actual 70-410 Exam's Question and Answers from Passleader.

http://www.passleader.com

Explanation:
PolicyDefinitions folder within the SYSVOL folder hierarchy. By placing the ADMX files in this directory, they
are replicated to every DC in the domain; by extension, the ADMX-aware Group Policy Management Console
in Windows Vista, Windows 7, Windows Server 2008 and R2 can check this folder as an additional source of
ADMX files, and will report them accordingly when setting your policies.
By default, the folder is not created. Whether you are a single DC or several thousand, I would strongly
recommend you create a Central Store and start using it for all your ADMX file storage. It really does work well.
The Central Store To take advantage of the benefits of .admx files, you must create a Central Store in the
SYSVOL folder on a domain controller. The Central Store is a file location that is checked by the Group Policy
tools. The Group Policy tools use any .admx files that are in the Central Store. The files that are in the Central
Store are later replicated to all domain controllers in the domain. To create a Central Store for .admx and .adml
files, create a folder that is named PolicyDefinitions in the following location: \\FQDN\SYSVOL\FQDN\policies
Note: FQDN is a fully qualified domain name.
http://tigermatt.wordpress.com/tag/policydefinitions/
http://support.microsoft.com/kb/929841/en-us
http://www.virtuallyimpossible.co.uk/how-to-create-a-group-policy-central-store/ http://support.microsoft.com/
kb/2741591/en-us
QUESTION 66
Your network contains an Active Directory domain named contoso.com. The password policy for the domain is
set to require a minimum password length of 10 characters. A user named User1 and a user named User2
work for the sales department. User1 is forced to create a domain password that has a minimum of 12
characters.
User2 is forced to create a domain password that has a minimum of eight characters. You need to identify
what forces the two users to have different password lengths.
Which tool should you use?
A.
B.
C.
D.

Credential Manager
Security Configuration Wizard (SCW)
Group Policy Management
Active Directory Administrative Center

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc770842(v=ws.10).aspx In Windows Server 2008, you can use finegrained password policies to specify multiple password policies and apply different password restrictions and
account lockout policies to different sets of users within a single domain. For example, to increase the security
of privileged accounts, you can apply stricter settings to the privileged accounts and then apply less strict
settings to the accounts of other users. Or in some cases, you may want to apply a special password policy for
accounts whose passwords are synchronized with other data sources.

QUESTION 67
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 R2 installed.
L2P.com has a Hyper-V server, named L2P-SR13, which hosts multiple virtual machines. You have enabled
the use of Single-root I/O virtualization. Which of the following is TRUE with regards to using Single-root I/O
virtualization? (Choose all that apply.)

A. It maximizes network throughput, while minimizing network latency.


B. It maximizes network throughput, as well as network latency.

C. It avoids the virtual switch stack and allows the virtual machine direct access to the actual network switch.
D. It prevents the virtual machine from accessing the network switch directly.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
SR-IOV enables network traffic to bypass the software switch layer of the Hyper-V virtualizationstack. Because
the VF is assigned to a child partition, the network traffic flows directly between the VF and child partition. As a
result, the I/O overhead in the software emulation layer is diminished and achieves network performance that
is nearly the same performance as in nonvirtualized environments.
http://msdn.microsoft.com/en-us/library/windows/hardware/hh440148%28v=vs.85%29.aspx
QUESTION 68
You work as a senior administrator at L2P.com. The L2P.com network consists of a single domain named
L2P.com. All servers on the L2P.com network have Windows Server 2012 R2 installed. You are running a
training exercise for junior administrators. You are currently discussing the use of Non-Uniform Memory
Architecture (NUMA). Which of the following is TRUE with regards to Non-Uniform Memory Architecture
(NUMA)? (Choose two.)
A.
B.
C.
D.

It is a computer architecture used in multiprocessor systems.


It is a computer architecture used in single processor systems.
It allows a processor to access local memory faster than it can access remote memory.
It allows a processor to access remote memory faster than it can access local memory.

Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
NUMA is a hardware design feature that divides CPUs and memory in a physical server into NUMA nodes.
You get the best performance when a process uses memory and CPU from within the same NUMA node.
de is full, then it'll get memory from
When a process requires more memory, but the current NUMA no another NUMA node and that comes at a
performance cost to that process, and possibly all other processes on that physical server.
And that's why virtualization engineers need to be aware of this. In Hyper-V we have Dynamic Memory.
Non-Uniform Memory Access or Non-Uniform Memory Architecture (NUMA) is a computer memory design
used in multiprocessors, where the memory access time depends on the memory location relative to a
processor. Under ccNUMA, a processor can access its own local memory faster than non-local memory, that
is, memory local to another processor or memory shared between processors. NUMA architectures logically
follow in scaling from symmetric multiprocessing (SMP) architectures.
http://en.wikipedia.org/wiki/Non-Uniform_Memory_Access
http://www.aidanfinn.com/?p=11945
QUESTION 69
You have a server named Data1 that runs a Server Core Installation of Windows Server 2012 R2 Standard.
You need to configure Data1 to run a Server Core Installation of Windows Server 2012 R2 Enterprise.
You want to achieve this goal by using the minimum amount of administrative effort.
What should you perform?
A. a clean installation of Windows Server 2012
B. an offline servicing by using Dism
C. an online servicing by using Dism

D. an upgrade installation of Windows Server 2012


Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
ROD: windows server 2012 enterprise DOES NOT EXIST, maybe they meant data center? http://
technet.microsoft.com/en-us/library/hh825157.aspx
QUESTION 70
You have a server named Server1 that runs Windows Server 2012 R2. You need to enable access-based
enumeration for a file share on Server1.
Which tool should you use?
A.
B.
C.
D.

File Server Resource Manager (FSRM)


File Explorer
Share and Storage Management
Server Manager

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Windows 2008 use Share and Storage Management
Windows 2012 use Server Manager
QUESTION 71
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1. Server1 runs Windows Server 2012 R2. You plan to create a shared folder. The shared folder will
have a quota limit. You discover that when you run the New Share Wizard, you cannot select the SMB Share Advanced option.
You need to ensure that you can use SMB Share - Advanced to create the new share. What should you do on
Server1 before you run the New Share Wizard?
A.
B.
C.
D.

Run the Set-SmbSharecmdlet.


Install the File Server Resource Manager role service.
Configure Dynamic Access Control and Apply a central access policy.
Configure the Advanced system settings.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:

QUESTION 72
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012
R2. A server named Server1 is configured to encrypt all traffic by using IPSec. You need to ensure that
Server1 can respond to ping requests from computers that do not support IPSec.
What should you do?
A. From a command prompt, run netsh set global autotuninglevel = restricted congestionprovider = ctcp.
B. From Windows Firewall with Advanced Security, exempt ICMP from IPSec.
C. From a command prompt, run netsh set global
autotuninglevelhighlyrestrictedcongestionprovider=none.
D. From Windows Firewall with Advanced Security, allow unicast responses for the Domain Profile.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:

QUESTION 73
You plan to deploy a file server to a temporary location. The temporary location experiences intermittent power
failures. The file server will contain a dedicated volume for shared folders. You need to create a volume for the
shared folders. The solution must minimize the likelihood of file corruption if a power failure occurs.
Which file system should you use?
A.
B.
C.
D.

ReFS
NFS
NTFS
FAT32

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The ReFS file system allows for resiliency against corruptions with the option to salvage amongst many other
key features like Metadata integrity with checksums, Integrity streams with optional user data integrity, and
shared storage pools across machines for additional failure tolerance and load balancing, etc.
QUESTION 74
Your company has a main office and four branch offices. The main office contains a server named Server1
that runs Windows Server 2012 R2. The IP configuration of each office is configured as shown in the following
table.

You need to add a single static route on Server1 to ensure that Server1 can communicate with the hosts on all
of the subnets.
Which command should you run?
A.
B.
C.
D.

route.exe add -p 10.10.0.0 mask 255.255.252.0 10.10.0.1


route.exe add -p 172.16.16.0 mask 255.255.252.0 10.10.0.1
route.exe add -p 10.10.0.0 mask 255.255.252.0 172.16.0.0
route.exe add -p 172.16.18.0 mask 255.255.252.0 10.10.0.1

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
These parameters will allow communication with all the hosts.

QUESTION 75
You work as a senior administrator at L2P.com. The L2P.com network consists of a single domain named
L2P.com. All servers on the L2P.com network have Windows Server 2012 R2 installed. You are running a
training exercise for junior administrators. You are currently discussing what happens when you run the
Remove-NetLbfoTeam Windows PowerShell cmdlet. Which of the following describes the results of running
this cmdlet?

A.
B.
C.
D.

It removes one or more network adapters from a specified NIC team.


It removes a team interface from a NIC team.
It removes a specified NIC team from the host.
It removes a network adapter member from a switch team.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Remove-NetLbfoTeam removes the specified NIC team from the host The Remove-NetLbfoTeam cmdlet
removes the specified NIC team from the host. This cmdlet disconnects all associated team members and
providers from the team. You can specify the team to remove by using either a team object retrieved by GetNetLbfoTeam, or by specifying a team name.
You can use Remove-NetLbfoTeam to remove all NIC teams from the server. You need administrator
privileges to use Remove-NetLbfoTeam. http://technet.microsoft.com/en-us/library/jj130848%28v=wps.620%
29.aspx
QUESTION 76
You work as a senior administrator at L2P.com. The L2P.com network consists of a single domain named
L2P.com. All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 R2
installed.

You are running a training exercise for junior administrators. You are currently discussing the Virtual Fibre
Channel SAN feature. Which of the following is TRUE with regards to the Virtual Fibre Channel SAN feature?
(Choose all that apply.)
A.
B.
C.
D.

It prevents virtual machines from connecting directly to Fibre Channel storage.


It allows for virtual machines to connect to Fibre Channel storage directly.
It includes support for virtual SANs, live migration, and multipath I/O.
It includes support for virtual SANs, and live migration, but not multipath I/O.

Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
To gain the full benefits of server virtualization and cloud architectures, virtualized workloads need to connect
easily and reliably to existing SANs. For many enterprise organizations, Hyper-V deployments were limited in
scale and scope because they lacked the ability to directly connect VMs to Fibre Channel SAN storage from
inside a VM. Hyper- V in Windows Server 2012 R2 now provides virtual Fibre Channel Host Bus Adapter
(HBA) ports within the guest operating system that runs the virtual machine, connecting virtual machines
directly to FibreChannel SAN Logical Unit Numbers (LUNs).
Virtual Fibre Channel for Hyper-V provides several important advantages for Hyper-V environments:
Simplifies storage connectivity for virtualized workloads to ultra-reliable, high-performance Fibre Channel SAN
storage
Enables new solutions that require shared storage, such as failover clustering, live migration, andmultipath I/O
Leverages and protects existing investments in Fibre Channel storage ? Enables advanced FC SAN storage
functionality for VMs
Facilitates migration of FC workloads into the cloud
Enables improved monitoring and troubleshooting, with visibility from the VM to the FC SAN storage Enables
centralized management of Ethernet and FC-based virtualized workloads Combining Virtual Fibre Channel for
Hyper-V and the Brocade?Fibre Channel SAN infrastructure greatly simplifies connectivity between Fibre
Channel SAN storage and virtualized applications, enabling enterprise IT and hosting providers to achieve new
levels of availability, reliability, and scalability for cloud-based services.
You need your virtualized workloads to connect easily and reliably to your existing storage arrays. Windows
Server 2012 R2 provides Fibre Channel ports within the guest operating system, which allows you to connect
to Fibre Channel directly from within virtual machines. This feature protects your investments in Fibre Channel,
enables you to virtualize workloads that use direct access to Fibre Channel storage, allows you to cluster
guest operating systems over Fibre Channel, and provides an important new storage option for servers hosted
in your virtualization infrastructure. With this Hyper-V virtual Fibre Channel feature, you can connect to Fibre
Channel storage from within a virtual machine. This allows you to use your existing Fibre Channel investments
to support virtualized workloads. Support for Fibre Channel in Hyper-V guests also includes support for many
relatedfeatures, such as virtual SANs, live migration, and MPIO. http://technet.microsoft.com/en-us/library/
hh831413.aspx http://www.brocade.com/downloads/documents/technical_briefs/virtual-fibre-channel-hypervtb.pdf
QUESTION 77
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1 that runs Windows Server 2012 R2. On a server named Server2, you perform a Server Core
Installation of Windows Server 2012 R2.
You join Server2 to the contoso.com domain.
You need to ensure that you can manage Server2 by using the Computer Management console on Server1.
What should you do on Server2?
A. Install Remote Server Administration Tools (RSAT).
B. Install Windows Management Framework.
C. Run sconfig.exe and configure remote management.

D. Run sconfig.exe and configure Remote Server Administration Tools (RSAT).


Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
In Windows Server 2012 R2, you can use the Server Configuration tool (Sconfig.cmd) to configure and
manage several common aspects of Server Core installations. You must be a member of the Administrators
group to use the tool. Sconfig.cmd is available in the Minimal Server Interface and in Server with a GUI mode.

QUESTION 78
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 R2 installed.
When you recently added new workstations to the L2P.com manually, you found that that the computer
accounts were created in the default container. You want to make sure that the default container for newly
created computers is redirected to a specified, target organizational unit (OU).
Which of the following actions should you take?
A.
B.
C.
D.

You should consider making use of the replace.exe command-line tool.


You should consider making use of the redircmp.exe command-line tool.
You should consider making use of the redirusr.exe command-line tool.
You should consider making use of the rexec.exe command-line tool.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
redircmp.exe redirects the default container for newly created computers to a specified, targetorganizational
unit (OU) so that newly created computer objects are created in the specific target OU instead of in

CN=Computers.

http://technet.microsoft.com/pt-pt/library/cc770619%28v=ws.10%29.aspx http://support.microsoft.com/
kb/324949/en-us
http://support.microsoft.com/kb/555573/en-us
QUESTION 79
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
L2P.com has a Windows Server 2012 R2 domain controller, named L2P-DC01, which has the Domain Naming
master and the Schema master roles installed. L2P.com also has a Windows Server 2008 R2 domain
controller, named L2P-DC02, which has the PDC Emulator, RID master, and Infrastructure master roles
installed.
You have deployed a new Windows Server 2012 server, which belongs to a workgroup, in L2P.com's
perimeter network.
You then executed the djoin.exe command.
Which of the following is the purpose of the djoin.exe command?
A.
B.
C.
D.

It sets up a computer account in a domain and requests an offline domain join when a computer restarts.
It sets up a user account in a domain and requests an online domain join when a computer restarts.
It sets up a computer account in a domain and requests an offline domain join immediately.
It sets up a computer account in a domain and requests an online domain join immediately.

Correct Answer: A

Section: (none)
Explanation
Explanation/Reference:
Explanation:
To perform an offline domain join, you run commands by using a new tool named Djoin.exe. You use Djoin.exe
to provision computer account data into AD DS. You also use it to insert the computer account data into the
Windows directory of the destination computer, which is the computer that you want to join to the domain.
/localos Targets the local operating system installation, instead of an offline image, with the domain join
information. Because this parameter injects the blob data into the locally running operating system image, you
must restart the computer to complete the domain join operation, as you must also do for an onlinedomain join.

http://technet.microsoft.com/en-us/library/offline-domain-join-djoin-step-by- step%28v=ws.10%29.aspx
QUESTION 80
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers in the L2P.com domain have Windows Server 2012 R2 installed, while domain controllers have
Windows Server 2008 R2 installed.
You are then tasked with deploying a new Windows Server 2012 R2 domain controller. You are preparing to
install the DNS Server role, and enable the global catalog server option.
Which of the following actions should you take?
A.
B.
C.
D.

You should consider making use of Server Manager.


You should consider making use of the Active Directory Installation Wizard.
You should consider making use of the DHCP Installation Wizard
You should consider making use of TS Manager

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:

http://kpytko.pl/2012/09/07/adding-first-windows-server-2012-domain-controller-within-windows200320082008r2-network/
http://www.msserverpro.com/migrating-active-directory-domain-controller-from-windows-server- 2008-r2-towindows-server-2012/
QUESTION 81
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
all servers in the L2P.com domain has Windows Server 2012 R2 nstalled. You have logged on to a server,
named L2P-SR07, and would like to obtain the IP configurations of a server, named L2P-SR13.
Which of the following actions should you take?

A.
B.
C.
D.

You should consider making use of the Winrs.exe command.


You should consider making use of the Winsat.exe command.
You should consider making use of the Winpop.exe command.
You should consider making use of the Dsrm.exe command.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Windows Remote Management allows you to manage and execute programs remotely. You can use WinRS to
administer a Server Core installation remotely from the command line. WinRS is a command-line tool included
in both Windows Vista and the Full installation of Windows Server 2008, which relies on Windows Remote
Management (WinRM) to execute remote commands, especially for headless servers. WinRM is Microsoft's
implementation of the WS- Management protocol, a standard Simple Object Access Protocol (SOAP)-based,
firewall-friendly protocol that enables hardware and operating systems from different vendors to interoperate.
You can think of WinRM as the server side and WinRS the client side of WS-Management.
winrs -r:<some computer> ipconfig /all

http://technet.microsoft.com/en-us/library/dd163506.aspx
QUESTION 82
You have a domain controller named Server1 that runs Windows Server 2012 R2 and has the DNS Server
server role installed. Server1 hosts a DNS zone named contoso.com and a GlobalNames zone.

You discover that the root hints were removed from Server1.
You need to view the default root hints of Server1.
Which file should you open?
A.
B.
C.
D.

Netlogon.dns
Cache.dns
Globalnames.dns
Place.dns

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
DNS Server service implements root hints using a file, Cache.dns, stored in the systemroot\System32\Dns
folder on the server.
Thus viewing the Cache.dns file will show the root hints.
QUESTION 83
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers on the L2P.com network have Windows Server 2008 R2 installed. Most of the L2P.com servers
have 64 - bit CPU's installed, while the rest have 32 - bit CPU's installed.

You are informed that L2P.com wants to deploy Windows Server 2012 R2 on all their servers. You need to
make recommendations to ensure that this is possible.
Which of the following would you recommend?
A. You should inform L2P.com that the deployment can proceed without any changes.
B. You should inform L2P.com that the servers with 32 bit CPU's must be upgraded to include 64 bit CPU's for
the deployment to proceed.
C. You should inform L2P.com that the servers with 64 bit CPU's must be upgraded to include 32 bit CPU's for
the deployment to proceed.
D. You should inform L2P.com that the deployment is not in any way possible.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Windows Server 2012 is a 64-bit only operating system.
Minimum: 1.4 GHz 64-bit processor
http://technet.microsoft.com/en-us/library/jj134246.aspx
QUESTION 84
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers on the L2P.com network have Windows Server 2012 installed. L2P.com has its headquarters in
London, and several widespread satellite offices. When L2P.com releases a new written policy stating that the
graphical user interface (GUI) should not be installed on any servers deployed to L2P.com's satellite offices.
It is reported that a server in one of the satellite offices are not compliant with the new written policy. You are
required to remedy the situation, while using the least amount of user interaction.
Which of the following actions should you take?
A. You should consider uninstalling the User Interfaces and Infrastructure feature using a PowerShell cmdlet.

B. You should consider uninstalling the User Interfaces and Infrastructure feature via TS Manager.
C. You should consider uninstalling the User Interfaces and Infrastructure feature via Server Manager.
D. You should consider uninstalling the User Interfaces and Infrastructure feature using the Dsrm.exe
command from the command prompt.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
One of the great things about Windows PowerShell on Windows Server 2012 is all the great cmdlets and
functions. But these did not spring into being from nothingness http://blogs.technet.com/b/heyscriptingguy/
archive/2013/01/25/use-powershell-to-remove-the-gui- on-windows-server-2012.aspx
QUESTION 85
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 installed.
L2P.com has a server, named L2P-SR07, which has four network adapters. L2P.com has two SR07's network
adapters are connected to the one LAN, local area networks (LANs). Two of L2Pwhile the other two are connected to the other LAN.
You are required to configure one of the network adapter pairs into a network adapter team.
Which of the following actions should you take?
A.
B.
C.
D.

You should consider accessing the Group Policy Management Console (GPMC) on L2P-SR07.
You should consider accessing the TS Manager console on L2P-SR07.
You should consider accessing the Server Manager console on L2P-SR07.
You should consider accessing the Remote Desktop Gateway Manager console on L2P-SR07.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
NIC teaming, also known as Load Balancing/Failover (LBFO), allows multiple network adapters tobe placed
into a team for the purposes of bandwidth aggregation, and/or traffic failover to maintain connectivity in the
event of a network component failure.

#####

http://www.microsoft.com/en-us/download/details.aspx?id=30160
QUESTION 86
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers on the L2P.com network have Windows Server 2012 installed. A server named, L2P-SR13, has a
Server Core Installation of Windows Server 2012 installed.
SR13's installation to a Server with GUI installation.
You are instructed to convert L2PYou want to use a Windows PowerShell cmdlet that uses Windows Update as a source.
Which of the following actions should you take?

A. You should consider making use of the Install-WindowsFeature Server-Gui-Mgmt-Infra, Server-Gui-Shell Restart cmdlet.
B. You should consider making use of the Install-WindowsFeature Server-Gui-Mgmt-Infra, Server-Gui-Shell Restart -Source c:\mountdir\windows\winsxs cmdlet.
Remove cmdlet.
C. You should consider making use of the Uninstall-WindowsFeature Server-Gui-Shell
D. You should consider making use of the Set-ExecutionPolicy cmdlet.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The Full GUI Server Interface provides you with the full GUI of Windows Server 2012 R2. PowerShell
Command: Install-WindowsFeature Server-Gui-Mgmt-Infra, Server-Gui-Shell When its done, we will need to
restart our server by using the Shutdown command:
shutdown -r -t 0
http://blogs.technet.com/b/bruce_adamczak/archive/2013/02/06/windows-2012-core-survival- guide- changingthe-gui-type.aspx
http://www.howtogeek.com/111967/how-to-turn-the-gui-off-and-on-in-windows-server-2012/
QUESTION 87
You work as a senior administrator at L2P.com. The L2P.com network consists of a single domain named
L2P.com. All servers on the L2P.com network have Windows Server 2012 installed. You are running a training
exercise for junior administrators.
You are currently discussing Storage Spaces.
Which of the following is TRUE with regards to Storage Spaces?
A. Mirroring and parity are optional resilient storage modes of Storage Spaces.
B. Failover clustering is not supported by Storage Spaces.
C. Storage spaces are virtual disks with associated attributes such as a preferred level of resiliency, and thin
or fixed provisioning.
D. Storage spaces are a collection of physical disks with associated attributes such as a preferred level of
resiliency, and thin or fixed provisioning.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Storage Spaces lets you group drives together in a storage pool. Then you can use pool capacity to create
storage spaces.
Storage spaces are virtual drives that appear in File Explorer. You can use them like any other drive, so it's
easy to work with files on them.
You can create large storage spaces and add more drives to them when you run low on pool capacity.
If you have two or more drives in the storage pool, you can create storage spaces that won't be -- or even the
failure of two drives, if you create a three-way mirror storage space.
affected by a drive failure
Storage Spaces includes the following features:
1. Storage pools. Storage pools are the fundamental building blocks for Storage Spaces. Administrators are
already familiar with this concept, so they will not have to learn a new model. They can flexibly create storage
pools based on the needs of the deployment. For example, given a set of physical disks, an administrator can
create one pool (by using all the available physical disks) or multiple pools (by dividing the physical disks as

required). Furthermore, to maximize the value from storage hardware, the administrator can map a storage
pool to combinations of hard disks as well as solid-state drives (SSDs). Pools can be expanded dynamically by
simply adding additional drives, thereby seamlessly scaling to cope with unceasing data growth.
2. Multitenancy. Administration of storage pools can be controlled through access control lists (ACLs) and
delegated on a per-pool basis, thereby supporting hosting scenarios that require tenant isolation. Storage
Spaces follows the familiar Windows security model; therefore, it can be fully integrated with Active Directory
Domain Services.
3. Resilient storage. Storage Spaces support two optional resiliency modes: mirroring and parity. Per-pool
support for disks that are reserved for replacing failed disks (hot spares), background scrubbing, and intelligent
error correction allow continuous service availability despite storage component failures. In the event of a
power failure or cluster failover, the integrity of data is preserved so that recovery happens quickly and does
not result in data loss.
4. Continuous availability. Storage Spaces is fully integrated with failover clustering, which allows it to deliver
continuously available service deployments. One or more pools can be clustered across multiple nodes within
a single cluster. Storage spaces can then be instantiated on individual nodes, and the storage will seamlessly
fail over to a different node when necessary (in response to failure conditions or due to load balancing).
Integration with CSVs permits scale-out access to data.
5. Optimal storage use. Server consolidation often results in multiple data sets sharing the same
storage hardware. Storage Spaces supports thin provisioning to allow businesses to easily share storage
capacity among multiple unrelated data sets and thereby maximize capacity use.
6. Storage Spaces also supports trim, automatically running the Storage Optimizer to help reduce the physical
footprint of data by consolidating data.
7. Operational simplicity. Fully remoteable and scriptable management is permitted through the Windows
Storage Management API, WMI, and Windows PowerShell. Storage Spaces can be easily managed through
the File and Storage Services role in Server Manager. Storage Spaces also provides notifications when the
amount of available capacity in a storage pool hits a configurable threshold.

http://windows.microsoft.com/en-us/windows-8/storage-spaces-pools http://technet.microsoft.com/en-us/
library/hh831739.aspx http://www.howtogeek.com/109380/how-to-use-windows-8s-storage-spaces-to-mirrorcombine- drives/
QUESTION 88
You work as a senior administrator at L2P.com. The L2P.com network consists of a single domain named
L2P.com. All servers on the L2P.com network have Windows Server 2012 installed. You are running a training
exercise for junior administrators.
You are currently discussing NIC Teaming.
Which of the following is TRUE with regards to NIC Teaming? (Choose all that apply.)
A.
B.
C.
D.

It allows for traffic failover to prevent connectivity loss if a network component fails.
It prevents bandwidth aggregation.
The Windows Server 2012 implementation of NIC Teaming supports a maximum of 5 NICs in a team.
The Windows Server 2012 implementation of NIC Teaming supports a maximum of 32 NICs in a team.

Correct Answer: AD

Section: (none)
Explanation
Explanation/Reference:
Explanation:
NIC teaming, also known as Load Balancing/Failover (LBFO), allows multiple network adapters to be placed
into a team for the purposes of bandwidth aggregation, and/or traffic failover to maintain connectivity in the
event of a network component failure. This feature has long been available from NIC vendors but until now NIC
teaming has not been included with Windows Server. Do I have to select a standby member to get fault
tolerance (failover)? No. IN any team with two or more network adapters if a network adapter fails in an Active/
Active configuration, the traffic on that network adapter will gracefully failover to the other network adapters in
the team even if none of the other adapters are in standby mode.
Number of NICs in a team in a native host
NIC teaming requires the presence of at least one Ethernet NIC. A team of one NIC may be used for
separation of traffic using VLANs. Obviously a team with only one team member has no failure protection.
Fault protection (failover) requires a minimum of two Ethernet NICs in the team. The Windows Server 2012
implementation supports up to 32 NICs in a team.
Number of team interfaces for a team Windows Server
2012 supports up to 32 team interfaces.
http://download.microsoft.com/download/F/6/5/F65196AA-2AB8-49A6-A427- 373647880534/%5BWindows %
20Server%202012%20NIC%20Teaming%20(LBFO)%20Deploy ment%20and%20Management% 5D.docx
QUESTION 89
You work as a senior administrator at L2P.com. The L2P.com network consists of a single domain named
L2P.com. All servers on the L2P.com network have Windows Server 2012 installed. You are running a training
exercise for junior administrators. You are currently discussing spanned volumes.
Which of the following is TRUE with regards to spanned volumes? (Choose all that apply.)
A.
B.
C.
D.

Spanned volumes do not provide fault tolerance.


Spanned volumes are a fault tolerant solution.
You can extend a spanned volume onto a maximum of 16 dynamic disks.
You cannot create a spanned volume using a system volume or boot volume.

Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A spanned volume is a dynamic volume consisting of disk space on more than one physical disk. If a simple
volume is not a system volume or boot volume, you can extend it across additional disks to create a spanned
volume, or you can create a spanned volume in unallocated space on a dynamic disk.
You need at least two dynamic disks in addition to the startup disk to create a spanned volume. You can
extend a spanned volume onto a maximum of 32 dynamic disks.
Spanned volumes are not fault tolerant.
http://technet.microsoft.com/en-us/library/cc772180.aspx
QUESTION 90
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 R2 installed.
You have just executed the Uninstall-WindowsFeature Server-Gui-Shell L2P.com server, named L2P-SR13.
Which of the following is the reason for doing this?
A.
B.
C.
D.

To only remove Windows Explorer from L2P-SR13.


To only remove the Windows Internet Explorer from L2P-SR13.
To only remove the components and files related to Windows Explorer from L2PSR13.
To remove Windows Explorer, Windows Internet Explorer, and all associated components and files from

L2P-SR13.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Minimal Server Interface
If the server has a full installation of Windows Server, and I need to bring the server down to minimal server
interface, I only need to remove the Server-GUI-Shell. The command is shown here. Get-WindowsFeature
Server-Gui-Shell | Uninstall-WindowsFeature - restart Minimal Server Interface is situated between the Server
Core and Server with a GUI modes, you can either install features on Server Core or remove features from
Server with a GUI to reach the Minimal Server Interface installation state
http://blogs.technet.com/b/heyscriptingguy/archive/2013/01/25/use-powershell-to-remove-the-gui- onwindows-server-2012.aspx
http://blogs.technet.com/b/server_core/archive/2012/05/09/configuring-the-minimal-server- interface.aspx
QUESTION 91
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 R2 installed.
You have been instructed to add a new domain controller to L2P.com's existing environment.
Which of the following actions should you take?
A.
B.
C.
D.

You should consider making use of Server Manager.


You should consider making use of Authorization Manager.
You should consider making use of Remote Desktop Gateway Manager.
You should consider making use of Network Load Balancing Manager.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://social.technet.microsoft.com/wiki/contents/articles/12370.step-by-step-guide-for-setting-up- windowsserver-2012-domain-controller.aspx
QUESTION 92
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 installed.
You have been instructed to modify an Active Directory computer object.
Which of the following actions should you take?

A.
B.
C.
D.

You should consider making use of the Get-ADComputer Windows PowerShell cmdlet.
You should consider making use of the Set-ADComputer Windows PowerShell cmdlet
You should consider making use of the New-ADComputer Windows PowerShell cmdlet
You should consider making use of the Get-ADComputerServiceAccount Windows PowerShell cmdlet

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Set-ADComputer - Modifies an Active Directory computer object. http://technet.microsoft.com/en-us/library/

ee617263.aspx
QUESTION 93
You work as an administrator at L2P.com. The L2P.com network consists of an Active Directory forest that
contains a root domain, named L2P.com, and two child domains, named us.L2P.com and uk.L2P.com. All
servers on the L2P.com network have Windows Server 2012 R2 installed. The root domain hosts a domain
local distribution group, named L2PGroup. You are preparing to issue L2PGroup read-only access to a shared
folder hosted by the us.L2P.com domain.
You want to make sure that L2PGroup is able to access the shared folder in the us.L2P.com domain.
Which of the following actions should you take?
A.
B.
C.
D.

You should consider re-configuring L2PGroup as a universal Admins group.


You should consider re-configuring L2PGroup as a universal security group.
You should consider re-configuring L2PGroup as a global administrators group.
You should consider re-configuring L2PGroup as a local administrators group.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Group scope Universal can be assigned permissions in any domain or forest.

http://technet.microsoft.com/en-us/library/cc781446(v=ws.10).aspx http://technet.microsoft.com/en-us/library/
cc755692(v=ws.10).aspx
QUESTION 94
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
L2P.com has a domain controller, named L2P-DC01, which has Windows Server 2012 R2 installed. Another
L2P.com domain controller, named L2P-DC02, has Windows Server 2008 R2 installed.
You have deployed a server, named L2P-SR15, on L2P.com's perimeter network. L2PSR15 is running a
Server Core Installation of Windows Server 2012 R2. You have been instructed to make sure that L2P-SR15 is
part of the L2P.com domain.
Which of the following actions should you take?
A. You should consider making use of Set-Computer Windows PowerShell cmdlet on L2P-SR15.
B. You should consider making use of Get-Computer Windows PowerShell cmdlet on L2P-SR15.
C. You should consider making use of Test-Computer Windows PowerShell cmdlet on L2P-SR15.

D. You should consider making use of Add-Computer Windows PowerShell cmdlet on L2P-SR15.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Add-Computer - Add the local computer to a domain or workgroup. http://technet.microsoft.com/en-us/library/
hh849798.aspx
QUESTION 95
You work as an administrator at L2P.com. The L2P.com network consists of two Active Directory forests,
named L2P.com and test.com. There is no trust relationship configured between the forests. A backup of
Group Policy object (GPO) from the test.com domain is stored on a domain controller in the L2P.com domain.
You are informed that a GPO must be created in the L2P.com domain, and must be based on the settings of
the GPO in the test.com domain. You start by creating the new GPO using the New-GPO Windows
PowerShell cmdlet. You want to complete the task via a Windows PowerShell cmdlet.
Which of the following actions should you take?
A.
B.
C.
D.

You should consider making use of the Invoke-GPUpdate Windows PowerShell cmdlet.
You should consider making use of the Copy-GPO Windows PowerShell cmdlet.
You should consider making use of the New-GPLink Windows PowerShell cmdlet.
You should consider making use of the Import-GPO Windows PowerShell cmdlet.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Import-GPO -Imports the Group Policy settings from a backed-up GPO into a specified GPO. http://
technet.microsoft.com/en-us/library/ee461044.aspx
QUESTION 96
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 R2 installed.
L2P.com has a server, named L2P-SR15, which is configured as a file server. You have received instructions
to make sure that a user, named Mia Hamm, has the ability to generate a complete backup of L2P-SR15 via
Windows Server Backup.
Which of the following actions should you take?
A.
B.
C.
D.

You should consider making use of Computer Management to configure the local groups.
You should consider making use of Computer Management to configure the domain local groups.
You should consider making use of Computer Management to configure the global groups.
You should consider making use of Computer Management to configure the administrator groups.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
To perform backups or recoveries by using Windows Server Backup, you must be a member of the
Administrators or Backup Operators groups.
http://technet.microsoft.com/en-us/library/ee849849%28v=ws.10%29.aspx Notes

You can only use Backup locally; you cannot backup a remote computer. You can only back up and restore
System State data on a local computer. You cannot back up and restore System State data on a remote
computer even if you are an administrator on the remote computer.
http://technet.microsoft.com/en-us/library/cc776822%28v=ws.10%29.aspx
QUESTION 97
You work as a senior administrator at L2P.com. The L2P.com network consists of a single domain named
L2P.com. All servers on the L2P.com network have Windows Server 2012 R2 installed. You are running a
training exercise for junior administrators. You are currently discussing the Windows Firewall with Advanced
Security feature. Which of the following is TRUE with regards to Windows Firewall with Advanced Security?
(Choose all that apply.)
A.
B.
C.
D.
E.

It provides host-based, two-way network traffic filtering for a computer.


It provides host-based, one-way network traffic filtering for a computer.
It blocks unauthorized network traffic flowing into or out of the local computer.
It only blocks unauthorized network traffic flowing into the local computer.
It only blocks unauthorized network traffic flowing out of the local computer.

Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Windows Firewall with Advanced Security is an important part of a layered security model. By providing hostbased, two-way network traffic filtering for a computer, Windows Firewall with Advanced Security blocks
unauthorized network traffic flowing into or out of the local computer. Windows Firewall with Advanced Security
also works with Network Awareness so that it can apply security settings appropriate to the types of networks
to which the computer is connected. Windows Firewall and Internet Protocol Security (IPsec) configuration
settings are integrated into a single Microsoft Management Console (MMC) named portant part of your
network's Windows Firewall with Advanced Security, so Windows Firewall is also an im isolation strategy.
http://technet.microsoft.com/en-us/library/hh831365.aspx
QUESTION 98
You work as a senior administrator at L2P.com. The L2P.com network consists of a single domain named
L2P.com. All servers on the L2P.com network have Windows Server 2012 R2 installed. You are running a
training exercise for junior administrators.
You are currently discussing connection security rules.
Which of the following is TRUE with regards to connection security rules? (Choose all that apply.)
A.
B.
C.
D.

Connection security rules allows for traffic to be secured via IPsec.


Connection security rules do not allow the traffic through the firewall.
Connection security rules are applied to programs or services.
Connection security rules are applied between two computers.

Correct Answer: ABD


Section: (none)
Explanation
Explanation/Reference:
Explanation:
Connection security involves the authentication of two computers before they begin communications and the
securing of information sent between two computers. Windows Firewall
with Advanced Security uses Internet Protocol security (IPsec) to achieve connection security by using key
exchange, authentication, data integrity, and, optionally, data encryption. How firewall rules and connection
security rules are related Firewall rules allow traffic through the firewall, but do not secure that traffic. To

secure traffic with IPsec, you can create Computer Connection Security rules. However, the creation of a
connection securityrule does not allow the traffic through the firewall. You must create a firewall rule to do this,
if the traffic is not allowed by the default behavior of the firewall. Connection security rules are not applied
toprograms or services; they are applied between the computers that make up the two endpoints.
http://technet.microsoft.com/en-us/library/cc772017.aspx http://technet.microsoft.com/en-us/library/cc772017%
28v=ws.10%29.aspx
QUESTION 99
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers in the L2P.com domain, including domain controllers, have Windows Server 2012 R2 installed.
You have been instructed to make sure that L2P.com users are not able to install a Windows Store application.
You then create a rule for packaged apps.
Which of the following is the rule based on? (Choose all that apply.)
A.
B.
C.
D.
E.
F.

The publisher of the package.


The publisher of the application.
The name of the package
The name of the application
The package version.
The application version.

Correct Answer: ACE


Section: (none)
Explanation
Explanation/Reference:
Explanation:
Packaged apps (also known as Windows 8 apps) are new to Windows Server 2012 R2 and Windows 8.
They are based on the new app model that ensures that all the files within an app package share the same
identity. Therefore, it is possible to control the entire application using a single AppLocker rule as opposed to
the non-packaged apps where each file within the app could have a unique identity. Windows does not support
unsigned packaged apps which implies all packaged apps must be signed.
AppLocker supports only publisher rules for Packaged apps. A publisher rule for a Packaged app is based on
the following information:
Publisher of the package
Package name
Package version
All the files within a package as well as the package installer share these attributes. Therefore, an AppLocker
rule for a Packaged app controls both the installation as well as the running of the app. Otherwise, the
publisher rules for Packaged apps are no different than the rest of the rule collections; they support exceptions,
can be increased or decreased in scope, and can be assigned to users and groups.
http://technet.microsoft.com/en-us/library/hh994588.aspx
QUESTION 100
You work as a senior administrator at L2P.com. The L2P.com network consists of a single domain named
L2P.com. All servers on the L2P.com network have Windows Server 2012 R2 installed. You are running a
training exercise for junior administrators.
You are currently discussing Group Policy preference.
Which of the following is TRUE with regards to Group Policy preference?
A.
B.
C.
D.

It supports applications and operating system features that are not compatible with Group Policy
It does not support item-level targeting.
It is the same as Group Policy filtering.
It does not cause the application or operating system feature to disable the user interface for the settings
they configure.

Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 101
You work as an administrator at ABC.com. The ABC.com network consists of a single domain named
ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2
installed.
DC01, which contains the ABC.com domain's
ABC.com has a domain controller, named ABCprimary DNS zone. ABC.com's workstations refer to ABC-DC01 as their primary DNS server. You have been
instructed to make sure that any DNS requests that are not for the ABC.com domain, DC01 querying the DNS
server of ABC.com's Internet Service Provider (ISP).
is resolved by ABCWhich of the following actions should you take?
A.
B.
C.
D.

You should consider configuring a reverse lookup zone.


You should consider configuring forward lookup zone.
You should consider configuring Forwarders.
You should consider configuring 019 IP Layer Forwarding.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A forwarder is a Domain Name System (DNS) server on a network that forwards DNS queries for external
DNS names to DNS servers outside that network. You can also forward queries according to specific domain
names using conditional forwarders.
You designate a DNS server on a network as a forwarder by configuring the other DNS servers in the network
to forward the queries that they cannot resolve locally to that DNS server. By using a forwarder, you can
manage name resolution for names outside your network, such as names on the Internet, and improve the
efficiency of name resolution for the computers in your network. http://technet.microsoft.com/en-us/library/
cc754931.aspx http://technet.microsoft.com/en-us/library/cc730756.aspx
QUESTION 102
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers on the L2P.com network have Windows Server 2012 R2 installed. L2P.com has a server, named
L2P-SR13, which is configured as the primary DNS server in the L2P.com domain. L2P.com has another
server, named L2P-SR14, which makes use of L2PSR13 for DNS queries.
You want to make sure that running nslookup.exe from L2P-SR14 produces a result that shows the proper
name of the default server.
Which of the following actions should you take?
A.
B.
C.
D.

You should consider creating a reverse lookup zone on L2P-SR14.


You should consider creating a forward lookup zone on L2P-SR14.
You should consider creating a reverse lookup zone on L2P-SR13.
You should consider creating a forward lookup zone on L2P-SR13.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
Explanation:
When you start Nslookup from a command line, the following error message may be displayed:
DNS request timed out
timeout was x seconds
Can't find server name for address xxx.xxx.xxx.xxx: Timed out Default servers are not available
Default Server: UnKnown
Address: xxx.xxx.xxx.xxx
where xxx.xxx.xxx.xxx is the Internet Protocol (IP) address of the host on which you are attempting to start
Nslookup.
CAUSE When Nslookup starts, it attempts to resolve the IP address of its host's DNS server to its fully
qualified domain name (FQDN). If the DNS server does not respond or if the DNS server's reverse lookup
zones do not contain a PTR record for the DNS server's IP address, the error message is displayed.
http://support.microsoft.com/kb/242906/en-us
QUESTION 103
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers on the L2P.com network have Windows Server 2012 R2 installed. L2P.com has a server, named
L2P-SR07, which has the ADDS, DHCP, and DNS server roles installed. L2P.com also has a server, named
L2P-SR08, which has the DHCP, and Remote Access server roles installed. You have configured a server,
which has the File and Storage Services server role installed, to automatically acquire an IP address. The
server is named L2PSR09. You then create reservation on L2P-SR07, and a filter on L2P-SR08. Which of the
following is a reason for this configuration?
A.
B.
C.
D.

It allows L2P-SR09 to acquire a constant IP address from L2P-SR08 only.


It configures L2P-SR09 with a static IP address.
It allows L2P-SR09 to acquire a constant IP address from L2P-SR07 and L2PSR08.
It allows L2P-SR09 to acquire a constant IP address from L2P-SR07 only.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
To configure the Deny filter
In the DHCP console tree of DHCP Server 1, under IPv4, click Filters, right-click Deny under Filters, and then
click New Filter. In the New Deny Filter dialog box, in MAC Address, enter a six hexadecimal number
representing the MAC or physical address of DHCP Client 2, click Add, and then click Close. Under Filters
right-click the Deny node, and then click the Enable pop-up menu item.
http://technet.microsoft.com/en-us/library/ee405265%28WS.10%29.aspx
QUESTION 104
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
L2P.com has a server, named L2P-SR15, which has Windows Server 2012 R2 installed. L2P.com also has a
server, named L2P-SR16, which has Windows Server 2008 R2 SP1 installed. You have been instructed to
make sure that L2P-SR16 is able to run Windows PowerShell 3.0. Which of the following actions should you
take? (Choose two.)
A. You should consider making sure that L2P-SR16 has a full installation of Microsoft .NET Framework 4
installed.
B. You should consider making sure that L2P-SR16 has a full installation of Microsoft .NET Framework 2
installed.
C. You should consider making sure that L2P-SR16 has WS-Management 3.0 installed.
D. You should consider making sure that L2P-SR16 is upgraded to Windows Server 2012 R2.

Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
WS-Management 3.0 - Windows Management Framework 3.0 Includes Windows PowerShell 3.0, WMI,
WinRM, Management OData IIS Extension, and Server Manager CIM Provider Windows Management
Framework 3.0 requires Microsoft .NET Framework 4.0. http://www.microsoft.com/en-us/download/
details.aspx?id=34595
QUESTION 105
You work as an administrator at L2P.com. The L2P.com network consists of a single domain named L2P.com.
All servers on the L2P.com network have Windows Server 2012 R2 installed. L2P.com has a server, named
L2P-SR13. L2P-SR13 hosts a shared folder, named L2PShare, which has been shared as L2PShare$.
Which of the following is TRUE with regards to sharing the folder in this manner?
A.
B.
C.
D.

It allows all users to view L2PShare when browsing the network.


It prevents users from viewing L2PShare when browsing the network.
It only allows L2P-SR13's users to view L2PShare.
It removes the permissions configured for L2PShare.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A hidden share is identified by a dollar sign ($) at the end of the share nameHidden shares are not listed when
you look through the shares on a computer or use the "net view" command Why Use Hidden Shares?
Using hidden shares on your network is useful if you do not want a shared folder or drive on the network to be
easily accessible. Hidden shares can add another layer of protection for shared files against unauthorized
people connecting to your network. Using hidden shares helps eliminate the chance for people to guess your
password (or be logged into an authorized Windows account) and then receive access to the shared resource.

http://support.microsoft.com/kb/314984
http://technet.microsoft.com/en-us/library/cc784710(v=ws.10).aspx
QUESTION 106
You work as a senior administrator at L2P.com. The L2P.com network consists of a single domain named
L2P.com. All servers on the L2P.com network have Windows Server 2012 R2 installed. You are running a
training exercise for junior administrators.
You are currently discussing printer pooling.
Which of the following is TRUE with regards to printer pooling? (Choose all that apply.)
A.
B.
C.
D.
E.
F.

Printers in a pool must be of the same model, and use the same printer driver.
Each printer in the pool must have a different printer driver.
Printer ports used in the pool must be of the same type.
The types of printer ports used in the pool must be mixed.
Pooled printers appear to workstations as a single printer.
A minimum of three printers are required to configure a printer pool.

Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
You can create a printing pool to automatically distribute print jobs to the next available printer. A printing pool
is one logical printer connected to multiple printers through multiple ports of the print server. The printer that is
idle receives the next document sent to the logical printer. This is useful in a network with a high volume of
printing because it decreases the time users wait for their documents. A printing pool also simplifies
administration because multiple printers can be managed from the samelogical printer on a server.
http://technet.microsoft.com/en-us/library/cc757086%28v=ws.10%29.aspx
QUESTION 107
You work as an administrator at ABC.com. The ABC.com network consists of a single domain named

ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2
installed.
SR13. ABC.com's
You have installed the DNS Server Role on a ABC.com server, named ABC- workstations make use of a web
proxy to access the Internet, and refer to ABC-SR13 as a primary DNS server.
ABC.com's workstations are
You have been instructed to make sure that Internet host names for not resolved by ABC-SR13.
Which of the following actions should you take?
A.
B.
C.
D.

You should consider configuring a primary zone on L2P-SR13.


You should consider configuring a secondary zone on L2P-SR13.
You should consider configuring a reverse lookup zone on L2P-SR13.
You should consider configuring a forward lookup zone on L2P-SR13.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Open DNS Server Manager | Expand DNS Server | Expand Forward Lookup Zones | Right Click on Forward
Lookup Zones and select New Zone | Primary Zone | Zone Name: "." (only dot, without quotation marks) When
you create such a zone, you are configuring the DNS server to be the ultimate authority for the DNS
namespace. The DNS server will no longer attempt to forward any DNS requests that it is not authoritative for.
When you install DNS on a Windows server that does not have a connection to the Internet, the zone for the
domain is created and a root zone, also known as a dot zone, is also created. This root zone may prevent
access to the Internet for DNS and for clients of the DNS. If there is a root zone, there are no other zones other
than those that are listed with DNS, and you cannot configure forwarders or roothint servers.
Root domain This is the top of the tree, representing an unnamed level; it is sometimes shown as two empty
quotation marks (""), indicating a null value. When used in a DNS domain name, it is stated by a trailing period
(.) to designate that the name is located at the root or highest level of the domain hierarchy. In this instance,
the DNS domain name is considered to be complete and points to an exact location in the tree of names.
Names stated this way are called fully qualified domain names (FQDNs).

http://technet.microsoft.com/en-us/library/cc772774%28v=ws.10%29.aspx http://youtu.be/KjMDtlR6Mhk http://


support.microsoft.com/kb/298148/en-us http://www.wincert.net/tips/windows-server/2510-how-to-remove-roothints-in-windows-server- 2008-r2- dns-server http://support.microsoft.com/kb/298148/en-us
QUESTION 108
You run a Windows Server 2012 R2, what is the PowerShell command to set preferred dns server. Note: Other
config such as ip address should not be changed.
A.
B.
C.
D.

Register-DnsClient
Set-DnsClient
Set-DnsPreferredClientServerAddress
Set-DnsClientServerAddress

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Set-DnsClientServerAddress - Sets DNS server addresses associated with the TCP/IP properties on an
interface.
Set-DnsClientServerAddress -InterfaceIndex 12 -ServerAddresses ("10.0.0.1")

There is a fair bit of confusion around the purpose of the Alternate DNS Server. This Post should hopefully put
these questions to bed.
The general assumption is that, the Windows DNS Client on all counts, will send a DNS query to the Preferred
DNS first. If this query fails, then it will query the Alternate DNS Server, and so on and so forth.
The above statement is true, however there is a twist.
The Windows DNS Client will reset the DNS Server Priority at periodic intervals. By default, the server
priorities are reset every 15 minutes.
Let's look at an example:
I have a DNS Client configured as follows:
Preferred DNS: 192.168.0.1
Alternate DNS: 10.10.0.1
The DNS Client will start by sending queries to 192.168.0.1. After 15 minutes it will switch priority to 10.10.0.1.
Thus all queries will first be sent to 10.10.0.1 for a period of 15 minutes before switching back to 192.168.0.1
There is another condition that triggers a Priority Switch. If say the Preferred DNS timed out on a DNS query,
the DNS Client will send that DNS Query to the Alternate DNS.
If the Alternate DNS resolves the Query, the Priority will now switch to the Alternate DNS, until either it times
out on a Query or the Priority Time Limit expires. It is a common practice to configure the Preferred DNS
Server with the IP of a Local Site DNS Server and the Alternate DNS Server with that of a Remote Site. The
problem arises when Firewall/Network folk raise complaints that Clients are sending DNS Traffic to Remote
DNS Servers. Well, that is because they have been configured to do so. http://blogs.technet.com/b/ajayr/
archive/2011/12/14/who-does-dns-client-prefer-preferred-oralternate.aspx
http://technet.microsoft.com/en-us/library/cc738344%28v=ws.10%29.aspx http://technet.microsoft.com/en-us/
library/jj590768.aspx

QUESTION 109
Command to set configure network interface primary dns server. Note: Other config such as ip address should
not be changed.

A.
B.
C.
D.

set-ipaddress
netsh
ipconfig
winipconfig

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
netsh interface ipv4 set dns name="Local Area Connection" source=static address =192.168.100.49 primary
http://exchangeserverpro.com/how-to-add-multiple-dns-servers-to-windows-server-2008-core/
QUESTION 110
A company's server deployment team needs to install fourteen Windows Server 2012 R2 to handle the
expected increase in holiday traffic. The team would like the option of switching the servers
between Server Core and Full GUI servers and do not want to be locked in to their first choice. The server
team would like four of the servers to include the Windows 8 Shell. Which installation option is required for
these servers?

A.
B.
C.
D.

Server Core
Desktop Experience
Server with a GUI
Minimal Server Interface

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The Desktop Experience installation option includes the Windows 8 Shell feature. This installation option also
includes other features available for installation not found in the other three; such as Themes, Windows Store
and support for Windows Store apps, and Windows Media Player. Quick Tip: To completely remove a feature
and the binary files from the disk, use the Windows PowerShell command Uninstall-WindowsFeature. For
example, to remove Desktop Experience:
Uninstall-WindowsFeature Desktop-Experience -Remove
http://technet.microsoft.com/en-us/library/hh831786.aspx http://mcpmag.com/articles/2013/01/22/70-410win2012-install.aspx
QUESTION 111
A company's network administrator needs to ensure a specific IP address is never assigned by a Windows
Server 2012 R2 DHCP server to any device connecting to the network. Which of the following should the
administrator configure on the Windows Server 2012 R2 DHCP server?
A.
B.
C.
D.

Reservation
Scope options
NAP
Scope properties

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Configuring an IP address as a reservation will restrict a DHCP server's assignment of that address unless a
specific MAC address makes a request for the address. Exclusion is for not use the IP Address or range inside
the Scope Pool, Filter is for not use theMAC Address or range.
Quick Tip: Policies can also be defined per scope or server. Policy based assignment (PBA) allows an
administrator to group DHCP clients by specific attributes based on fields contained in the DHCP client request
packet. This feature allows for targeted administration and greater control of configuration parameters
delivered to network devices.
http://technet.microsoft.com/en-us/library/jj200226.aspx http://mcpmag.com/articles/2013/02/12/70-410dhcp.aspx
Another correct answer? Create a Exclusion Range? You decide... but that option is not at the options list at
this question.

QUESTION 112
A company's server virtualization team needs to provision a series of Hyper-V workloads to use existing
network storage arrays. The team has chosen to use Fibre Channel ports within the guest operating systems.
Which of the following Windows Server versions can be used as guest operating systems when using Hyper-V
Fibre Channel ports?
A.
B.
C.
D.

2003 R2
2008
2003
2012

Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Windows Server 2008, 2008 R2, and 2012 R2 can be guest operating systems when using Hyper- V Fibre
Channel host bus adaptors (HBAs). Updated HBA drivers are needed along with NPIV- enabled (N_Port ID
Virtualization) SANs.
Quick Tip: Virtual Fibre Channel logical units cannot be used as boot media. http://technet.microsoft.com/enus/library/hh831413.aspx http://mcpmag.com/articles/2013/02/05/70-410-win2012-fibre.aspx
QUESTION 113
A company's server deployment team needs to introduce many new Windows Server 2012 R2 domain
controllers throughout the network into a single Windows Server 2008 R2 domain.
The team has chosen to use Windows PowerShell.
Which Windows PowerShell module includes the command-line options for installing domain controllers?
A. AD DS Administration cmdlets
B. AD DS Deployment cmdlets
C. AD CS Deployment cmdlets

D. AD DS Administration cmdlets
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
First use the Import-Module ADDSDeployment command in PowerShell--it includes the cmdlets needed to add
new domain controllers. Then run Install-ADDSDomainController along with the required arguments.
Quick Tip: DCPromo.exe has been deprecated but can still be used along with an answer file, and ADPrep.exe
runs automatically when needed (but can be run with elevated rights for more control). http://
technet.microsoft.com/en-us/library/hh994618.aspx http://mcpmag.com/articles/2013/02/19/70-410-win2012ad.aspx
QUESTION 114
A company's server administration team would like to take advantage of the newest file systems available with
Windows Server 2012 R2. The team needs a file system capable of managing extremely large data drives that
can auto-detect data corruption and automatically perform needed repairs without taking a volume offline.
Which file system should the server administration team choose?
A.
B.
C.
D.

NFS
DFS
NTFS
ReFS

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The ReFS (Resilient File System) is capable of managing extremely large data drives (1 YB Yottabyte), can
auto-detect data corruption, and automatically perform needed repairs without taking the volume offline.
Quick Tip: The command fsutil fsinfo volumeinfo x: will display the volume file system. ReFS is only intended
for data drives and not compatible with all Windows Server 2012 R2 file system technologies, however it is
compatible with the new Storage Spaces. http://technet.microsoft.com/en-us/library/hh831724.aspx http://
mcpmag.com/articles/2013/01/29/70-410-win2012-file.aspx
QUESTION 115
A company's server security team needs a solution that will prevent users from installing and using
unauthorized applications on their Windows 8 desktop computers.
Which technology should the team choose?
A.
B.
C.
D.

Starter GPOs
Group Policy Objects
Software Restriction Policies
AppLocker

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
AppLocker (Application Locker) can help prevent malicious (malware) and unsupported applications from
affecting computers. These include executable files, scripts, Windows Installer files, DLLs, Packaged apps and

Packaged app installers.


Quick Tip: AppLocker is also supported by Windows Server 2008 R2 and Windows 7. http://
technet.microsoft.com/en-us/library/hh831440.aspx http://mcpmag.com/articles/2013/02/26/controllingapplications.aspx ExamRef
QUESTION 116
You are attempting to delete a global security group in the Active Directory Users and Computers console, and
the console will not let you complete the task. Which of the following could possibly be causes for the failure?
(Choose all answers that are correct.)
A.
B.
C.
D.

There are still members in the group.


One of the group's members has the group set as its primary group.
You do not have the proper permissions for the container in which the group is located.
You cannot delete global groups from the Active Directory Users and Computers console.

Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Incorrect: It is possible to delete a group that has members. B. Correct: If any member sets the group as its
primary group, then the system does not permit the group to be deleted.
C. Correct: You must have the appropriate Active Directory permissions for the container in which the group is
located to delete it.
D. Incorrect: It is possible to delete groups using the Active Directory Users and Groups console.
QUESTION 117
In a domain running at the Windows Server 2012 R2 domain functional level, which of the following security
principals can members of a global group? (Choose all answers that are correct.)
A.
B.
C.
D.

Users
Computers
Universal groups
Global groups

Correct Answer: ABD


Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Correct: Users can be security principals in a global group. B. Correct: Computers can be security principals
in a global group. C. Incorrect: Universal groups cannot be security principals in a global group. D. Correct:
Global group can be security principals in a global group.
QUESTION 118
Which of the following group scope modifications are never permitted? (Choose all answers that are correct.)
A.
B.
C.
D.

Global to universal
Global to domain local
Universal to global
Domain local to universal

Correct Answer: B
Section: (none)

Explanation
Explanation/Reference:
Explanation:
A. Incorrect: Global to universal group conversions are sometimes permitted. B. Correct: Global to domain
local group conversions are never permitted. C. Incorrect: Universal to global group conversions are
sometimes permitted. D. Incorrect: Domain local to universal group conversions are sometimes permitted.
QUESTION 119
Which of the following is not a correct reason for creating an OU?
A.
B.
C.
D.

To create a permanent container that cannot be moved or renamed


To duplicate the divisions in your organization
To delegate administration tasks
To assign different Group Policy settings to a specific group of users or computers

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Correct: The reasons for creating an OU include duplicating organizational divisions, assigning Group Policy
settings, and delegating administration. You can easily move or rename an OU at will. B. Incorrect: Duplicating
organizational divisions is a viable reason for creating an OU. C. Incorrect: Delegating administration tasks is a
viable reason for creating an OU. D. Incorrect: Assigning Group Policy settings is a viable reason for creating
an OU.
QUESTION 120
Which of the following groups do you use to consolidate groups and accounts that either span multiple
domains or the entire forest?
A.
B.
C.
D.

Global
Domain local
Built-in
Universal

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Incorrect: Global groups cannot contain users from other domains. B. Incorrect: Domain local groups cannot
have permissions for resources in other domains. C. Incorrect: Built-in groups have no inherent cross-domain
qualities. D. Correct: Universal groups, like global groups, are used to organize users according to their
resource access needs. You can use them to organize users to facilitate access to any resource located in any
domain in the forest through the use of domain local groups. Universal groups are used to consolidate groups
and accounts that either span multiple domains or the entire forest.
QUESTION 121
Which of the following are the two built-in user accounts created automatically on a computer running
Windows Server 2012 R2?
A. Network
B. Interactive

C. Administrator
D. Guest
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Incorrect: There is no Network account in Windows Server 2012 R2. B. Incorrect: There is no Interactive
account in Windows Server 2012 R2. C. Correct: By default, the two built-in user accounts created on a
computer running Windows Server 2012 are the Administrator account and the Guest account. D. Correct: By
default, the two built-in user accounts created on a computer running Windows Server 2012 are the
Administrator account and the Guest account.
QUESTION 122
Which of the following is not a type of user account that can be configured in Windows Server 2012 R2?
A.
B.
C.
D.

local accounts
domain accounts
network accounts
built-in accounts

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A. Incorrect: Local accounts can be created and configured in Windows Server 2012 R2. B. Incorrect: Domain
accounts can be created and configured in Windows Server 2012 R2. C. Correct: Three types of user
accounts can be created and configured in Windows Server 2012:
local accounts, domain accounts, and built-in user accounts. D. Incorrect: Built-in accounts can be created and
configured in Windows Server 2012 R2.
QUESTION 123
Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2.
Server1 and Server2 are part of a workgroup.
On Server1 and Server2, you create a local user account named Admin1. You add the account to the local
Administrators group. On both servers, Admin1 has the same password. You log on to Server1 as Admin1.
You open Computer Management and you connect to Server2. When you attempt to create a scheduled task,
view the event logs, and manage the shared folders, you receive Access Denied messages.
You need to ensure that you can administer Server2 remotely from Server1 by using Computer Management.
What should you configure on Server2?
A.
B.
C.
D.

From Registry Editor, configure the LocalAccountTokenFilterPolicy registry value.


From Local Users and Groups, modify the membership of the Remote Management Users group.
From Server Manager, modify the Remote Management setting.
From Windows Firewall, modify the Windows Management Instrumentation (WMI) firewall rule.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:

The LocalAccountTokenFilterPolicy setting affects how administrator credentials are applied to remotely
administer the computer.
http://support.microsoft.com/kb/942817
QUESTION 124
Your network contains an Active Directory domain named adatum.com. The domain contains a server named
Server1 that runs Windows Server 2012 R2. On a server named Corel, you perform a Server Core Installation
of Windows Server 2012 R2.
You join Corel to the adatum.com domain.
You need to ensure that you can use Event Viewer on Server1 to view the event logs on Core1.
What should you do on Core1?
A.
B.
C.
D.

Run the Disable NetFirewallRule cmdlet.


Install Remote Server Administration Tools (RSAT).
Install Windows Management Framework.
Enable NetFirewallRule cmdlet.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Information regarding IPsec policy changes, etc. can be found in the Event Viewer. Thus you need to enable
the NetFirewallRule command. This will allow you to view the event logs.
QUESTION 125
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1. Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
On Server1, you create and start a virtual machine named VM1.
VM1 is configured as shown in the following table.

You need to recommend a solution to minimize the amount of disk space used for the snapshot of VM1.
What should you do before you create the snapshot?
A.
B.
C.
D.

Run the Stop-VM cmdlet.


Decrease the Minimum RAM.
Run the Convert-VHD cmdlet.
Convert diskl.vhd to a dynamically expanding disk.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Original answer is D.
But the correct answer is A.

The disk configuration (dynamic Vs. fixed) has little impact on the snapshot size. However snapshotting a
machine whilst it is running means a RAM dump is also saved to preserve the systems running state at that
moment. That requires as much disk space as RAM being used at that time. This is avoided if the machine is
shutdown first, reducing the snapshot size by a great deal.
QUESTION 126
You have a server named Serverl that runs Windows Server 2012 R2. You try to install the Microsoft .NET
Framework 3.5 Features feature on Serverl, but the installation fails repeatedly.
You need to ensure that the feature can be installed on Serverl.
What should you do?
A.
B.
C.
D.

Run the Add-AppxProvisionedPackage cmdlet.


Disable User Account Control (UAC).
Connect Serverl to the Internet.
Remove the .NET Framework 4.5 Features feature.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 127
You have a server named Server1 that runs Windows Server 2012 R2.
Server1 has the Hyper-V server role installed.
An iSCSI SAN is available on the network.
Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. You create a LUN on the SAN to host
the virtual hard drive files for the virtual machines. You need to create a 3-TB virtual hard disk for VM1 on the
LUN. The solution must prevent VM1 from being paused if the LUN runs out of disk space.
Which type of virtual hard disk should you create on the LUN?
A.
B.
C.
D.

Fixed-size VHDX
Dynamically expanding VHDX
Fixed-size VHD
Dynamically expanding VHD

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 128
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 has the virtual switches
listed in the following table.

You create a virtual machine named VM1. VM1 has two network adapters. One network adapter connects to
vSwitch1. The other network adapter connects to vSwitch2.

You configure NIC teaming on VM1.


You need to ensure that if a physical NIC fails on Server1, VM1 remains connected to the network.
What should you do on Server1?
A.
B.
C.
D.

Run the Set-VmNetworkAdapter cmdlet.


Create a new virtual switch on Server1.
Modify the properties of vSwitch1 and vSwitch2.
Add a new network adapter to VM1.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 129
Your network contains an Active Directory domain named adatum.com. The domain contains a member server
named Host1. Host1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
Host1 hosts two virtual machines named VMS and VM6. Both virtual machines connect to a virtual switch
named Virtual 1.
On VM5, you install a network monitoring application named Monitor1. You need to capture all of the inbound
and outbound traffic to VM6 by using Monitor1. Which two commands should you run from Windows
PowerShell? (Each correct answer presents part of the solution. Choose two.)
A.
B.
C.
D.
E.
F.

Get-VM "VM6" | Set-VMNetworkAdapter-IovWeight 1


Get-VM "VM5" I Set-VMNetworkAdapter -IovWeight 0
Get-VM "VM5" | Set-VMNetworkAdapter -PortMirroring Source
Get-VM "VM6" | Set-VMNetworkAdapter -AllowTeaming On
Get-VM "VM6" | Set-VMNetworkAdapter -PortMirroring Destination
Get-VM "VM5" | Set-VMNetworkAdapter -AllowTeaming On

Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
-PortMirroring specifies the port mirroring mode for the network adapter. This can be set to None, Source, and
Destination.
If set to Source, a copy of every network packet it sends or receives is forwarded to a virtual network adapter
configured to receive the packets. If set to Destination, it receives copied packets from the source virtual
network adapter.
In this scenario, VM5 is the destination which must receive a copy of the network packets from VM6, which s
the source.
http://technet.microsoft.com/en-us/library/hh848457.aspx
QUESTION 130
You have a server named Server1 that runs Windows Server 2012 R2. You plan to use Windows PowerShell
Desired State Configuration (DSC) to confirm that the Application Identity service is running on all file servers.
You define the following configuration in the Windows PowerShell Integrated Scripting Environment (ISE):

You need to use DSC to configure Server1 as defined in the configuration.


What should you run first?
A.
B.
C.
D.

Service 1
Test-DscConfiguration
Start-DscConfiguration
Configuration1

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 131
Your network contains an Active Directory domain named contoso.com. The domain contains a DHCP server
named Server1 that runs Windows Server 2012 R2. You create a DHCP scope named Scope1. The scope
has a start address of 192.168.1.10, an end address of 192.168.1.50, and a subnet mask of 255.255.255.192.
You need to ensure that Scope1 has a subnet mask of 255.255.255.0.
What should you do first?
A.
B.
C.
D.

From the DHCP console, reconcile Scope1.


From the DHCP console, delete Scope1.
From the DHCP console, modify the Scope Options of Scope1.
From Windows PowerShell, run the Set-DhcpServerv4Scope cmdlet.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
After you create a scope in DHCP, the subnet option is greyed out, you can not change it. You can change the
starting and ending ip addresses, but not the subnet mask. So, the only option you have left is to delete it and
create a new one with the right subnet.
There you can see the subnet option on the DHCP scope:
https://www.youtube.com/watch?v=atdWcJIuCTw
QUESTION 132
Your network contains an Active Directory domain named contoso.com. You have a DHCP server named
Server1 that runs Windows Server 2008. You install Windows Server 2012 R2 on a server named Server2.
You install the DHCP Server server role on Server2.
You need to migrate the DHCP services from Server1 to Server2.
The solution must meet the following requirements:
- Ensure that existing leases are migrated.

- Prevent lease conflicts.


Which three actions should you perform? (Each correct answer presents part of the solution.
Choose three.)
A.
B.
C.
D.
E.
F.

On Server1, run the Export-DhcpServer cmdlet.


On Server1, run the Stop-Service cmdlet.
On Server2, run the Receive-SmigServerData cmdlet.
On Server2, run the Stop-Service cmdlet.
On Server2, run the Import-DhcpServer cmdlet.
On Server1, run the Send-SmigServerData cmdlet.

Correct Answer: ABE


Section: (none)
Explanation
Explanation/Reference:
QUESTION 133
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has three physical network
adapters named NIC1, NIC2, and NIC3. On Server1, you create a NIC team named Team1 by using NIC1 and
NIC2. You configure Team1 to accept network traffic on VLAN 10. You need to ensure that Server1 can accept
network traffic on VLAN 10 and VLAN 11. The solution must ensure that the network traffic can be received on
both VLANs if a network adapter fails.
What should you do?
A.
B.
C.
D.

From Server Manager, change the load balancing mode of Team1.


Run the New-NetLbfoTeam cmdlet.
From Server Manager, add an interface to Team1.
Run the Add-NetLbfoTeamMember cmdlet.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 134
You have a server named Server1 that runs Windows Server 2012 R2. You need to create a script that will
create and mount a virtual hard disk.
Which tool should you use?
A.
B.
C.
D.

vdsldr.exe
diskpart.exe
fsutil.exe
vds.exe

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:

QUESTION 135
You have virtual machine named VM1.
VM1 uses a fixed size virtual hard disk (VHD) named diskl.vhd. Diskl.vhd is 200 GB.
You shut down VM1.
You need to reduce the size of diskl.vhd.
Which action should you select from the Edit Virtual Hard Disk Wizard?
A.
B.
C.
D.

Merge
Compact
Shrink
Convert

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The Edit Virtual Hard Disk Wizard allows you to Compact, Convert, or Expand the VHD. Compacting reduces
the size of a dynamically expanding VHD but not a fixed-size VHD. Converting changes the disk format to the
newer VHDX. This process recreates the virtual disk, and allows you to specify the size of the VHDX.
http://blogs.technet.com/b/yungchou/archive/2013/01/23/hyper-v-virtual-hard-disk-vhd-operationsexplained.aspx
http://blogs.technet.com/b/aviraj/archive/2012/05/06/windows-server-2012-convert-vhd-to-vhdx- using-hyper-vmanager.aspx
QUESTION 136
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts 50 virtual
machines that run Windows Server 2012 R2.
Your company uses smart cards for authentication.
You need to ensure that you can use smart card authentication when you connect to the virtual machine by
using Virtual Machine Connection.
What should you configure?
A.
B.
C.
D.

The NUMA Spanning settings


The RemoteFX settings
The Enhanced Session Mode Policy
The Integration Services settings

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 137
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1. Server1 runs Windows Server 2012 R2. You need to create a 3-TB virtual hard disk (VHD) on
Server1.
Which tool should you use?
A. Computer Management
B. Server Manager
C. Share and Storage Management

D. New-VirtualDisk
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
For other questions to create a VHD (file) you can use computer management.
- Share and storage management (2008 only)
- New-storagesubsystemVirtualDisk (this is a virtual disk, NOT a virtual hard disk)
- Server Manager (you would use this to create virtual disks, not virtual hard disks)
QUESTION 138
Your network contains an Active Directory domain named contoso.com. The domain contains a member
server named Server1. Server1 runs Windows Server 2012 R2 and has the DHCP Server server role installed.
You create two IPv4 scopes on Server1.
The scopes are configured as shown in the following table.

The DHCP clients in Subnet_Tor can connect to the client computers in Subnet_Mtl by using an IP address or
a FQDN.
You discover that the DHCP clients in Subnet_Mtl can connect to client computers in Subnet_Tor by using an
IP address only.
You need to ensure that the DHCP clients in both subnets can connect to any other DHCP client by using a
FQDN.
What should you add?
A.
B.
C.
D.

The 015 DNS Domain Name option to Subnet_Mtl


The 015 DNS Domain Name option to Subnet_Tor
The 006 DNS Servers option to Subnet_Mtl
The 006 DNS Servers option to Subnet_Tor

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 139
You have a server named Server1 that runs Windows Server 2012 R2. You add an additional disk to Server1
as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that users can access the additional disk from drive C.
What should you do?
A.
B.
C.
D.

Convert Disk 0 and Disk 1 to dynamic disks and extend a volume.


Convert Disk 1 to a dynamic disk and create a spanned volume.
Create a simple volume on Disk 1 and mount the volume to a folder.
Convert Disk 0 to a dynamic disk and add a mirror.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 140
Your network contains several servers that run Windows Server 2012 R2 and client computers that run
Windows 8.1.
You download several signed Windows PowerShell scripts from the Internet. You need to run the PowerShell
scripts on all of the servers and all of the client computers.
What should you modify first?
A.
B.
C.
D.

the environment variables on all of the servers


the environment variables on all client computers
the execution policy on all of the servers
the execution policy on all of the client computers

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
First modify the environment variables on the server, then modify them on client computers.
QUESTION 141
Your network contains an Active Directory domain named contoso.com. The domain contains a domain
controller named Server1 that runs Windows Server 2012 R2.
On Server1, you create a work folder named Work1.
A user named User1 connects to Work1 from a computer named Computer1. You need to identify the last time
the documents in Work1 were synchronized successfully from Computer1.
What should you do?
A.
B.
C.
D.

From Windows PowerShell, run the Get-SyncShare cmdlet.


From Windows PowerShell, run the Get-SyncUserSettings cmdlet.
From Server Manager, review the properties of Computer1.
From Server Manager, review the properties of User1.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 142
Your network contains an Active Directory domain named contoso.com. The domain contains 100 user
accounts that reside in an organizational unit (OU) named OU1. You need to ensure that a user named User1
can link and unlink Group Policy objects (GPOs) to OU1. The solution must minimize the number of
permissions assigned to User1.
What should you do?
A.
B.
C.
D.

Add User1 to the Group Policy Creator Owners group.


Modify the permissions on the User1 account.
Modify the permissions on OU1.
Run the Delegation of Control Wizard on the Policies container.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 143
Your network contains an Active Directory domain named contoso.com. The domain contains hundreds of
groups, many of which are nested in other groups. The domain contains a user account named User1. User1
is a direct member of 15 groups. You need to identify of which Active Directory groups User1 is a member,
including the nested groups. The solution must minimize administrative effort.
Which tool should you use?
A. ADSI Edit
B. Get-ADUser

C. Active Directory Users and Computers


D. Dsget
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 144
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1. The domain contains a standalone server named Server2 that is located in a perimeter network. Both
servers run Windows Server 2012 R2.
You need to manage Server2 remotely from Server1.
What should you do?
A.
B.
C.
D.

From Server2, run the Enable-PsRemoting cmdlet.


From Server1, run the winrm command.
From Server2, run the winrm command.
From Server1, run the Enable-PsRemoting cmdlet.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 145
Your network contains an Active Directory forest named contoso.com. The forest contains five domains. All
domain controllers run Windows Server 2012 R2. The contoso.com domain contains two user accounts named
Admin1 and Admin2. You need to ensure that Admin1 and Admin2 can configure hardware and services on all
of the member servers in the forest. The solution must minimize the number of privileges granted to Admin1
and Admin2.
Which built-in groups should you use?
A.
B.
C.
D.

Server Operators global groups


Domain Admins global groups
Administrators domain local groups
Administrators local groups

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 146
Your network contains a server named Server1 and 10 Web servers.
All servers run Windows Server 2012 R2.
You create a Windows PowerShell Desired State Configuration (DSC) to push the settings from Server1 to all
of the Web servers.
On Server1, you modify the file set for the Web servers. You need to ensure that all of the Web servers have
the latest configurations.

Which cmdlet should you run on Server1?


A.
B.
C.
D.

Restore-DcsConfiguration
Set DcsLocalConfigurationManager
Start-DcsConfiguration
Get-DcsConfiguration

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 147
Your network contains an Active Directory domain named contoso.com. The domain contains servers named
Server1 and Server2 that run Windows Server 2012 R2. Server1 has the Active Directory Federation Services
server role installed. Server2 is a file server. Your company introduces a Bring Your Own Device (BYOD)
policy. You need to ensure that users can use a personal device to access domain resources by using Single
Sign-On (SSO) while they are connected to the internal network. Which two actions should you perform?
(Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
E.

Enable the Device Registration Service in Active Directory.


Publish the Device Registration Service by using a Web Application Proxy.
Configure Active Directory Federation Services (AD FS) for the Device Registration Service.
Install the Work Folders role service on Server2.
Create and configure a sync share on Server2.

Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
*Prepare your Active Directory forest to support devices This is a one-time operation that you must run to
prepare your Active Directory forest to support devices.
To prepare the Active Directory forest
On your federation server, open a Windows PowerShell command window and type:
Initialize-ADDeviceRegistration
*Enable Device Registration Service on a federation server farm node To enable Device Registration Service
1.On your federation server, open a Windows PowerShell command window and type:
Enable-AdfsDeviceRegistration
2.Repeat this step on each federation farm node in your AD FS farm.
QUESTION 148
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1.Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed.
On Server1, you create and start a virtual machine named VM1.VM1 is configured as shown in the following
table.

You need to recommend a solution to minimize the amount of disk space used for the checkpoint of VM1.
What should you do before you create the checkpoint?
A.
B.
C.
D.

Run the Resize-VHD cmdlet.


Convert Disk1.vhd to a dynamically expanding disk.
Shut down VM1.
Run the Convert-VHD cmdlet.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 149
Your network contains a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts a
virtual machine named VM1 that runs Windows Server 2012 R2. You take a snapshot of VM1, and then you
install an application on VM1.
You verify that the application runs properly.
You need to ensure that the current state of VM1 is contained in a single virtual hard disk file. The solution
must minimize the amount of downtime on VM1.
What should you do?
A.
B.
C.
D.

From Hyper-V Manager, delete the snapshot.


From a command prompt, run dism.exe and specify the /commit-image parameter.
From a command prompt, run dism.exe and specify the /delete-image parameter.
From Hyper-V Manager, inspect the virtual hard disk.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Virtual machine snapshots are file-based snapshots of the state, disk data, and configuration of a
virtualmachine at a specific point in time.
You can take multiple snapshots of a virtual machine, even while it is running. You can then revert the virtual
machine to any of the previous states by Applying a snapshot to the virtualmachine. Taking a snapshot of a
VM is to in essence freeze the current state and make it a parent disk based on currentstate, and at the same
time create a child disk to capture all subsequent changes. - See more at:
Snapshots require adequate storage space. Snapshots are stored as .avhd files in the same location at
thevirtual hard disk. Taking multiple snapshots can quickly consume a large amount of storage space.
When you use Hyper-V Manager to delete a snapshot, the snapshot is removed from the snapshot treebut the
.avhd file is not deleted until you turn off the virtual machine.

http://www.laneolson.ca/2009/10/09/hyper-v-snapshots-and-disk-space/ http://blogs.technet.com/b/yungchou/
archive/2013/01/23/hyper-v-virtual-hard-disk-vhdoperations- explained.aspx
http://zoom.it/12u8
http://www.server-talk.eu/wp-content/uploads/article_2010-05-28_02.png http://blogs.msdn.com/b/
virtual_pc_guy/archive/2009/04/15/what-happens-when-i-delete- asnapshot-hyper-v.aspx
http://blogs.technet.com/b/yungchou/archive/2013/01/23/hyper-v-virtual-hard-disk-vhd- operationsexplained.aspx
http://blogs.technet.com/b/josebda/archive/2012/03/20/windows-server-8-beta-hyper-vover-smbquickprovisioning-a-vm-on-an-smb-file-share.aspx
QUESTION 150
Your network contains an Active Directory domain named adatum.com. The domain contains a server named
Server1 that runs Windows Server 2012 R2. On a server named Corel, you perform a Server Core Installation

of Windows Server 2012 R2.You join Corel to the adatum.com domain.


You need to ensure that you can use Event Viewer on Server1 to view the event logs on Corel.
What should you do on Corel?
A.
B.
C.
D.

Run the Enable-NetFirewallRulecmdlet.


Run the Disable-NetFirewallRulecmdlet.
Install Windows Management Framework.
Install Remote Server Administration Tools (RSAT).

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Information regarding IPsec policy changes, etc. can be found in the Event Viewer. Thus you need to enable
the NetFirewallRule command. This will allow you to view the event logs.
QUESTION 151
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1.Server1 runs Windows Server 2012 R2. You need to create a 3-TB virtual hard disk (VHD) on
Server1.
Which tool should you use?
A.
B.
C.
D.

New-StoragePool
Diskpart
File Server Resource Manager (FSRM)
New-StorageSubsytemVirtualDisk

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
You can create a VHD from either the Disk Management snap-in or the command line (diskpart). From the
DiskPart command-line tool at an elevated command prompt, run the create vdisk command and specify the
file (to name the file) and maximum (to set the maximum size in megabytes) parameters. The following code
demonstrates how to create a VHD file at
C:\vdisks\disk1.vdh with a maximum file size of 16 GB (or 16,000 MB).
DiskPart
Microsoft DiskPart version 6.1.7100
Copyright (C) 1999-2008 Microsoft Corporation.
On computer: WIN7
DISKPART> create vdisk file="C:\vdisks\disk1.vhd" maximum=16000
QUESTION 152
Your network contains an Active Directory domain named contoso.com. You create a software restriction
policy to allow an application named App1 by using a certificate rule.
You need to ensure that when users attempt to execute App1, the certificate for App1 is verified against a
certificate revocation list (CRL).
What should you do?
A. Modify the rule for App1.
B. Modify the Trusted Publishers Properties.
C. Create a new certificate rule for App1.

D. Modify the Enforcement Properties.


Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 153
You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1. You need to
add a graphical user interface (GUI) to Server1.
Which tool should you use?
A.
B.
C.
D.

The Install-WindowsFeaturecmdlet
The Install-Module cmdlet
The Install-RoleServicecmdlet
The setup.exe command

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The DISM command is called by the Add-WindowsFeature commanD. Here is the syntax for DISM:
Dism /online /enable-feature /featurename:ServerCore-FullServer /featurename:Server- Gui-Shell /
featurename:Server-Gui-Mgmt
QUESTION 154
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts a virtual machine
named VM1 that runs Windows Server 2012 R2.
VM1 has several snapshots.
You need to modify the snapshot file location of VM1.
What should you do?
A.
B.
C.
D.

Delete the existing snapshots, and then modify the settings of VM1.
Right-click VM1, and then click Move. ..
Right-click VM1, and then click Export...
PauseVM1, and then modify the settings of VM1.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
You will need to navigate to the Hyper-V Management snap-in
(C:\ProgramData\Microsoft\Windows\Hyper-V) and from there access the Snapshot file Location tab where
you can change the settings for the VM1 snapshot file location. However, since there are already several
snapshots in existence, you will need to delete them first because you will not be able to change the location of
the snapshot file while there is an existing snapshot.
You need to modify the snapshot file location of VM1.
QUESTION 155
You have a server named Print1 that runs Windows Server 2012 R2.
On Print1, you share a printer named Printer1.

You need to ensure that only the members of the Server Operators group, the Administrators group, and the
Print Operators group can send print jobs to Printer1.
What should you do?

A.
B.
C.
D.

Remove the permissions for the Creator Owner group.


Assign the Print permission to the Server Operators group.
Remove the permissions for the Everyone group.
Assign the Print permission to the Administrators group.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
By default Everyone can print. This permissions need to be removed.
QUESTION 156
You have a server named Server1 that runs Windows Server 2012 R2.
You connect three new hard disks to Server1.
You need to create a storage space that contains the three disks.
The solution must meet the following requirements:
- Provide fault tolerance if a single disk fails.
- Maximize the amount of useable storage space.
What should you create?

A.
B.
C.
D.

A mirrored space
A spanned volume
A parity space
A simple space

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Fault tolerant and better space ratio. The data on volumes created on this type of virtual disk, together with
parity information that can be used to facilitate automatic reconstruction of data in the event of a physical disk
failure, is striped across all physical disks in the pool. Parity virtual disks also provide resiliency to help protect
you from data loss arising from the failure 368 Chapter 8 File services and storage of a physical disk in the
pool, but they perform better with large sequential disk writes than with random I/O.
http://social.technet.microsoft.com/wiki/contents/articles/15198.storage-spaces-overview.aspx http://
technet.microsoft.com/en-us/library/cc772180.aspx
QUESTION 157
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2 Datacenter.Server1 is located in
an isolated network that cannot access the Internet. On Server1, you install a new virtual machine named
VM1.VM1 runs Windows Server 2012 R2 Essentials and connects to a private virtual network.
After 30 days, you discover that VM1 shuts down every 60 minutes. You need to resolve the issue that causes
VM1 to shut down every 60 minutes.
What should you do?

A.
B.
C.
D.

On VM1, run slmgr.exe and specify the /ipk parameter.


On Server1, run slmgr.exe and specify the /rearm-sku parameter.
Create a new internal virtual network and attach VM1 to the new virtual network.
On Server1, run Add-WindowsFeatureVolumeActivation.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 158
Your network contains an Active Directory forest named contoso.com. All domain controllers currently run
Windows Server 2008 R2. You plan to install a new domain controller named DC4 that runs Windows Server
2012 R2. The new domain controller will have the following configurations:
- Schema master
- Global catalog server
- Active Directory Federation Services server role
- Active Directory Certificate Services server role
You need to identify which configuration can be fulfilled by using the Active Directory Domain Services
Configuration Wizard.
Which configuration should you identify?
A.
B.
C.
D.

Enable the global catalog server.


Install the DNS Server role.
Install the Active Directory Certificate Services role.
Transfer the schema master.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 159
You have a server named Server1 that runs Windows Server 2012 R2. You try to install the Microsoft .NET
Framework 3.5 Features feature on Server1, but the installation fails repeatedly.
You need to ensure that the feature can be installed on Server1.
What should you do?
A.
B.
C.
D.

Run the Add-WindowsPackagecmdlet.


Disable User Account Control (UAC).
Specify an alternate source path.
Install the Web Server (IIS) server role.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:

QUESTION 160
You have a print server named Print1 that runs Windows Server 2012 R2.
Print1 has 10 shared printers.
You need to change the location of the spool folder.
What should you modify?
A.
B.
C.
D.

The properties of the Print Spooler service


The Print Server Properties
The user environment variables
The PrintQueue.inf file

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 161
Your network contains multiple subnets.
On one of the subnets, you deploy a server named Server1 that runs Windows Server 2012 R2. You install the
DNS Server server role on Server1, and then you create a standard primary zone named contoso.com.
You need to ensure that client computers can resolve IP addresses to host names.
What should you do first?
A.
B.
C.
D.

Create a GlobalNames zone.


Convert the contoso.com zone to an Active Directory-integrated zone.
Configure dynamic updates for contoso.com.
Create a reverse lookup zone.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 162
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role
installed. On Server1, you create a virtual machine named VM1.
You need to ensure that VM1 can start by using PXE.
What should you do?
A.
B.
C.
D.

Add a second network adapter, and then run the Set-VMNetworkAdaptercmdlet.


Add a second network adapter, and then configure network adapter teaming.
Remove the network adapter, and then run the Set-VMNetworkAdaptercmdlet.
Remove the network adapter, and then add a legacy network adapter.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 163

Your network contains an Active Directory domain named contoso.com. The domain contains two servers
named CONT1 and CONT2. Both servers run Windows Server 2012 R2. CONT1 has a shared printer named
Printer1. CONT2 connects to Printer1 on CONT1. When you attempt to remove Printer1 from CONT2, you
receive the error message shown in the exhibit. (Click the Exhibit button.)

You successfully delete the other printers installed on CONT2. You need to identify what prevents you from
deleting Printer1 on CONT2.
What should you identify?
A.
B.
C.
D.

Printer1 is deployed as part of a mandatory profile.


Printer1 is deployed by using a Group Policy object (GPO).
Your user account is not a member of the Print Operators group on CONT2.
Your user account is not a member of the Print Operators group on CONT1.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 164
Your network contains an Active Directory domain named contoso.com.
The domain contains a server named Server1.
Server1 runs Windows Server 2012 R2 and has the Hyper-V server role installed. You have a virtual machine
named VM1. VM1 has a checkpoint.
You need to modify the Checkpoint File Location of VM1.
What should you do first?
A.
B.
C.
D.

Copy the checkpoint file.


Delete the checkpoint.
Shut down VM1.
Pause VM1.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:

QUESTION 165
Your network contains an Active Directory domain named contoso.com. All user accounts in the marketing
department reside in an organizational unit (OU) named OU1. You have a Group Policy object (GPO) named
GPO1. GPO1 contains Folder Redirection settings. GPO1 has default permissions.
You discover that the Folder Redirection settings are not applied to the users in the marketing department.
You open Group Policy Management as shown in the exhibit. (Click the Exhibit button.)

You need to ensure that the Folder Redirection settings in GPO1 apply to the marketing users.
What should you do?
A.
B.
C.
D.

Modify the Delegation settings of GPO1.


Enable the link of GPO1.
Enforce GPO1.
Modify the link order of GPO1.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The reason it is NOT C is that when you Enforce GPO1, it will force its settings to all CHILD containers.
The Answer is Enable the link of GPO1.
You need to apply the settings of the GPO to the container that has the users, and those users are in UO1,
and this is where the GPO1 is sitting, but the link is disabled (Dimmed), and it is also not listed in window on
the right.
QUESTION 166
Note: This question is part of a series of questions that use the same or similar answer choices. An answer

choice may be correct for more than one question in the series. Each question is independent of the other
questions in this series. Information and details provided in a question apply only to that question.
Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain
controllers and a read-only domain controller (RODC) named RODC01.
You have a domain controller named DC5 that has the Server Graphical Shell disabled.
You create an orgranizational unit (OU) named OU1.
From DC5, you you need to create 50 new users accounts in OU1.
What tool should you use?
A.
B.
C.
D.
E.
F.
G.
H.

the ntdsutil command.


the Set-ADDomain cmdlet.
the Install-ADDSDornain cmdlet.
the dsadd command.
the dsamain command.
the dsmgmt command.
the net user command.
the Set ADForest cmdle

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 167
Note: This question is part of a series of questions that use the same or similar answer choices. An answer
choice may be correct for more than one question in the series. Each question is independent of the other
questions in this series. Information and details provided in a question apply only to that question.
Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain
controllers and a read-only domain controller (RODC) named RODC01.
The domain contains an administrator account named Admin1. You need to prevent Admin1 from creating
more than 100 objects in the domain partition.
Which tool should you use?
A.
B.
C.
D.
E.
F.
G.
H.

the ntdsutil command.


the Set-ADDomain cmdlet.
the Install-ADDSDornain cmdlet.
the dsadd command.
the dsamain command.
the dsmgmt command.
the net user command.
the Set ADForest cmdlet.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 168
Note: This question is part of a series of questions that use the same or similar answer choices. An answer
choice may be correct for more than one question in the series. Each question is independent of the other
questions in this series. Information and details provided in a question apply only to that question.

Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain
controllers and a read-only domain controller (RODC) named RODC01.
You plan to replace a domain controller named DC1.
DC1 has the schema operations master role.
You need to transfer the schema master role to another domain controller named DC10 before you remove
Active Directory from DC1.
Which tool should you use?
A.
B.
C.
D.
E.
F.
G.
H.

the ntdsutil command.


the Set-ADDomain cmdlet.
the Install-ADDSDornain cmdlet.
the dsadd command.
the dsamain command.
the dsmgmt command.
the net user command.
the Set ADForest cmdlet.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 169
Note: This question is part of a series of questions that use the same or similar answer choices. An answer
choice may be correct for more than one question in the series. Each question is independent of the other
questions in this series. Information and details provided in a question apply only to that question.
Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain
controllers and a read-only domain controller (RODC) named RODC01.
You need to ensure that when administrators create users in contoso.com, the default user principal name
(UPN) suffix is litwareinc.com.
Which cmdlet should you use?
A.
B.
C.
D.
E.
F.
G.
H.

the ntdsutil command.


the Set-ADDomain cmdlet.
the Install-ADDSDornain cmdlet.
the dsadd command.
the dsamain command.
the dsmgmt command.
the net user command.
the Set ADForest cmdlet.

Correct Answer: H
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://technet.microsoft.com/en-us/library/ee617221.aspx With this command, you modify UPN sufix for entire
forest
QUESTION 170
Note: This question is part of a series of questions that use the same or similar answer choices. An answer
choice may be correct for more than one question in the series. Each question is independent of the other

questions in this series. Information and details provided in a question apply only to that question.
Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain
controllers and a read-only domain controller (RODC) named RODC01.
You need to add an RODC to the domain by using the Install From Media (IFM) option.
Which tool should you use to create the media?
A.
B.
C.
D.
E.
F.
G.
H.

the ntdsutil command.


the Set-ADDomain cmdlet.
the Install-ADDSDornain cmdlet.
the dsadd command.
the dsamain command.
the dsmgmt command.
the net user command.
the Set ADForest cmdlet.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 171
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server1. Server1 runs Windows Server 2012 R2. You need to create a 3-TB virtual hard disk (VHD) on
Server1.
Which tool should you use?
A.
B.
C.
D.

Server Manager
Share and Storage Management
Computer Management
File Server Resource Manager (FSRM)

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
From Computer Management, click on Disk Management on left pane and wait for the list of drives to refresh.
Once the list of drives appear in the middle pane, right click Disk Management and select Create VHD.
QUESTION 172
Your network contains one Active Directory domain named contoso.com. The domain contains 2,000 client
computers used by students. You recently discover an increase in calls to the helpdesk that relate to security
policy to meet the following requirement:
- Modify the UserName of the built-in account named Administrator
- Support a time mismatch between client computers and domain controllers of up to three minutes.
Which Two security settings should you modify?
A. Account Policies
B. Password Policy
C. Account Lockout Policy

D.
E.
F.
G.
H.

Kerberos Policy
Local Policies
Audit Policy
User Rights Assignment
Security Options

Correct Answer: DH
Section: (none)
Explanation
Explanation/Reference:
QUESTION 173
Your network contains an Active Directory domain named contoso.com. You create a software restriction
policy to allow an application named App1 by using a certificate rule.
You need to prevent the software restriction policy from applying to users that are members of the local
Administrators group.
What should you do?

A.
B.
C.
D.

Modify the rule for App1


Modify the Enforcement Properties
Modify the Security Levels.
Modify the Trusted Publishers Properties

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://technet.microsoft.com/en-us/library/cc776536(v=ws.10).aspx
QUESTION 174
Your network contains one Active Directory domain named contoso.com. The domain contains 20 member
server and five domain controllers. All domain controllers run Windows Server 2012 R2. The domain contains
500 client computers. You plan to deploy a domain controller for contoso.com in Microsoft Azure. You need to
prepare the enviroment for the planned deployment. The solution must ensure that the domain controller
hosted in Azure always has the same IP address. Which two actions should you perfomr? Each correct
answer presents part of solution.
A.
B.
C.
D.
E.

Deploy a site-to-site virtual private network (VPN).


From an Azure virtual machine, run the Set-NetIPAddress cmdlet.
From an Azure virtual machine, run the Set-AzureStaticVNetIP cmdlet.
From a domain controller, run the Set-NetIPAddress cmdlet.
From a domain controller, run adprep.exe.

Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:

QUESTION 175
You have a server named Server1 that runs Windows Server 2012 R2. You apply a secerity policy to Server1
by using the Security Configuration Wizard (SCW).
You plan to roll back the security policy.
You need to indentify the setting that are prevented from rolling back using the SCW.
Which setting shoulld you identify?
A.
B.
C.
D.

the outbound authentication methods


the system access control lists (SACLs)
the service startup mode
the network security rules

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 176
The domain contains an organizational unit (OU) named Groups that contains a universal security named
Group1.
You run the following command from Windows PowerShell.
"Group2" Get-ADGroup Group1 -properties managedby | New-ADGroup -name SamAccountName group2 groupcategory distribution -groupscope global
You need to identify which properties of group1 will be copied to Group2. What should you identify? To
answer, select the appropriate options in the answer area.
The group type
Will be different from Group1
Will be the same as Group1
The group scope
Will be different from Group1
Will be the same as Group1
The managed by attribute
Will be different from Group1
Will be the same as Group1
The permission assigned to group1
Will be different from Group1
Will be the same as Group1
A.
B.
C.
D.
Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
The group type Will be different from Group1
The group scope Will be different from Group1
The managed by attribute Will be the same as Group1
The permission assigned to group1 --- this is either a typo or a trick question the command would not change
permissions on group 1 nor would it copy the permissions from group1 to group2.
QUESTION 177
You have a server named Server1 that Runs Windows Server 2012 R2.
You configure IPSec rules for connections to Server1.
On Server1, you plan to create an inbound firewall rule that contains the following settings:
- Allows inbound connections to an application named App1.exe
- Applies to the domain profile
- Overrides any block rules
You need to identify the minimum information required to create the rule. Which two pieces of information
should you identify? Each correct answer presents part of the solution.
A.
B.
C.
D.
E.

the list of Active Directory users who are authorized to use the application.
the list of computers that are authorized to use the application.
the hash of the application.
the local path of the application.
the name at the IPSec policies that apply to Server1

Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
B: To overwritte deny rule, you need to specify the list of computers.
D: For NAMED application you need local path to the app, in other case you will specify all programs, in
answer must be a match.
QUESTION 178
You have a server named Server1 that runs Windows Server 2012 R2. You apply a security policy to server1
by using the Security Configuration Wizard (CWM).
You plan to roll back the security policy.
You need to identify the settings that are prevented from rolling back running the CWM Witch settings should
you identify.
A.
B.
C.
D.

The secure startup order


The outbound authentication methods
The network security rules
The system access control list (SAClist)

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
System Keeps Auditing After Rollback
In the auditing section of SCW there is an option to include the SCWAudit.inf template. If you do so, SCW
configures System Access Control Lists (SACL) on a number of files. Without this template SCW will configure

the system to perform object access auditing but since no files have SACLs on them by default, no file access
will actually be audited. If you apply a policy with this option turned on and you subsequently roll back the
policy the SACLs will remain on the system. Consequently, if the system is configured to perform Object
Access Auditing you will find auditing events in the Security Event Log. This is by design. SCW is not designed
to roll back ACLs. To clear these SACLs you would need to manually restore any pre- existing SACLs. As long
as these were defined in a security template doing so is a simple matter of re-applying that security template.
http://blog.netwrix.com/2015/06/19/configure-audit-policy-and-security-using-security- configuration-wizard/
QUESTION 179
Your network contains an active directory domain named contoso.com. The domain consists 20 member
Servers and 5 domain controllers. All servers run Windows Server 2012 R2.
The domain contains 500 client computers.
You plan to deploy a domain controller for contoso.com in Microsoft Azure. You need to prepare the
conversation for planned deployment. The solution should ensure that the domain controller hosted in Azure
always have the same IP address. Which two actions should you perform? Each correct answer is a part of the
solution.
A.
B.
C.
D.
E.

From an Azure virtual machine run the Set-AzureStaticVNetIP cmdlet


Deploy a Side by side virtual private network (VPN)
From Azure virtual machine run the Set etIPAuthentication cmdlet
From an domain controller run the Set-NetIPAdresses cmdlet
From an domain controller run adprep.exe

Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 180
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 host 50 virtual
machines that run Windows Server 2012 R2.
You enable and configure enhanced session mode on Server1. you need to identify a new functionality
available for the virtual machines hosted on Server1.
What should you identify?
A.
B.
C.
D.

Smart card authentication using virtual machine connections


Redirection of RemoteFX USB drivers by using reomte desktop connections
Redirection of RemoteFX USB drivers using virtual machine connections
Smar card authentication using the remote desktop client.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 181
You have a DNS server named DNS1 that runs windows server 2012 R2. DNS1 is used to resolve the names
of internet resources by using several DNS forwarders. You need to prevent DNS1 from performing iterative
queries if the DNS forwarders are unable to reslove the queries.
Which cmdlet should you use?
A. Remove-DNSServerRootHint

B. Set-DNSServerPrimaryZone
C. Ser-DNSServerGlobalNameZone
D. Unregister-DNSserverDrirectoryPartition
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 182
Your network contains an Active Directory domain named contoso.com. The domain contains a DHCP server
named Server1 that runs Windows Server 2012 R2. You create a DHCP scope named Scope1. The scope
has a start address of 192.168.1.10. an end address of 192.168.1.50, and a subnet mask of 255.255.255.192.
You need to ensure that Scope1 has a subnet mask of 255.255.255.0.
What should you do first?
A.
B.
C.
D.

From the DHCP console, modify the properties of Scope1.


From the DHCP console, modify the Scope Options of Scope1.
From Windows PowerShell. run the Remove-DhcpServerv4Scope cmdlet.
From the DHCP console, reconcile Scope1.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 183
RODC comes with a number of features that focus on heightened security with limited functionality to remote
office users. Which of the following are features of RODC?
A.
B.
C.
D.

Filtered Attribute Sets


Read-Only DNS
Unidirectional Replication
All of these

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 184
Sometimes it's important to remove an RODC from your forest or domain. However, it's important that you
follow a simple rule whilst removing RODC's. What is this rule?
A.
B.
C.
D.

All RODC's must be detached before removing a final writable domain controller
All writable domain controllers must be removed before RODC's can be detached
Your forest must only consist of RODC's if you want to remove them
There are no rules for removing RODC's

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 185
Complete the missing word from the sentence below that is describing one of the new roles in Server 2012:
By using ___, you can augment an organization's security strategy by protecting information through persistent
usage policies, which remain with the information, no matter where it is moved.
A.
B.
C.
D.

ADFS
RODC
ADLDS
AD RMS

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 186
You have a server named Server1. that runs Windows Server 2012 R2. Server1 has live network adapters.
Three of the network adapters are connected to a network named LAN1. The two other network adapters are
connected to a network named LAN2.
You create a network adapter team named Team1 from two of all the adapters connected to LAN1.
You create a network adapter team named Team2 from the two adapters connected to LAN2. A company
policy states that all server IP addresses must he assigned by using a reserved address in DHCP.
You need to identify how many DHCP reservations you must create for Server1.
How many reservations should you identify?
A.
B.
C.
D.

2
3
5
7

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 187
You create an OU named tempusers. you add several test users to that OU.
You want to delete the ou and receive an error.
remove-adorganizationunit -identity "ou=tempusrs, dc=contoso,dc=com" - recursive.
A.
B.
C.
D.

Remove all the users from ou


Modify the rights to your user account
Set the confirm parameters to $true
Set the protectfromaccidential deletion to $false

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 188
You have a server that runs server core of windows 2012 r2 server. you need to ensure that windows updates
are installed only by using manual installation on server1. which 3 steps will you perform.
scregedit.wsf /au 1
wuauclt /selfupdatemanaged
uninstall-windowsfeature
netstop wuauserv
wuauclt /selfupdateunmanaged
net start wuauserv
A.
B.
C.
D.
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
1) netstop wuauserv
2) scregedit.wsf /au 1
3) net start wuauserv
Explanation:
https://technet.microsoft.com/en-us/library/jj574100.aspx
QUESTION 189
Your network has ipsec policy configured.
You need to exempt icmp and router discovery traffic from ipsec policy rule in windows firewall.
which command will you use
A.
B.
C.
D.

disable-netadapterbinding
update-netipsecrule
remove-netfirewallrule
set-netfirewallsetting

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 190
Your network contains one Active Directory domain named contoso.com. You deploy a new virtual machine in
microsoft azure and then you run the active directory domain configuration wizard as show in the exhibit. (click
the exhibit button). You need to ensure that all of the users in contoso.com are replicated to the new domain

controller in azure.
What should you do?
A.
B.
C.
D.

Modify the Deployment Configuration.


Set up directory integration.
Configuration Azure Active Directory Connect.
Select the Domain Name System (DNS) server check box.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 191
DC3 loses network connectivity due to a hardware failure.
You log on to DC3.
You need to identify which service location (SRV) records are registered by DC3.
What should you do?
A.
B.
C.
D.

Run ipconfig /displaydns.


Run dcdiag /test:dns.
Open the %windir%\system32\config\netlogon.dns file.
Open the %windir%\system32\dns\backup\adatum.com.dns file.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 192
You have 10 domain controller in a domain. you need to prevent several members of domain admin groups
from logging on the domain controller.
Which two object shoudl you create and configure.
A.
B.
C.
D.
E.

GPO to the domain


authentication policy
authentication policy silo
a central access policy
a user certificate

Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:

Drag&Drop
QUESTION 1
Your network contains an Active Directory domain named contoso.com.
The domain contains a server named Server1.
Server1 runs Windows Server 2012 and is configured as the only domain controller.
You need to retrieve a list of all the user accounts.
The list must include the last time each user was authenticated successfully. Which Windows PowerShell
command should you run? (To answer, drag the appropriate cmdlet or property to the correct locations to
complete the PowerShell command in the answer area. Each cmdlet or property may be used once, more than
once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 2
Drag and Drop Question
You have a print server named Server1. Server1 runs Windows Server 2008 R2. You have a file server named
Server2. Server2 runs Windows Server 2012 R2. You need to migrate all of the printers on Server1 to Server2.
Which actions should you perform on the servers2?
Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 3

Drag and Drop Question


Your network contains two Active Directory forests named adatum.com and contoso.com. Both forests contain
multiple domains. A two-way trust exists between the forests. The contoso.com domain contains a domain
local security group named Group1.
Group1 contains contoso\user1 and adatum\user1.
You need to ensure that Group1 can only contain users from the contoso.com domain. Which three actions
should you perform? To answer, move three actions from the list of actions to the answer area and arrange
them in the correct order.
Select and Place:

Correct Answer:

Section: (none)
Explanation

Explanation/Reference:

QUESTION 4
Drag and Drop Question
Your company has a main office that contains 225 client computers. The client computers are located on a
subnet that uses the network ID of 10.10.1.0/24. The company plans to open two branch offices. The offices
will be configured as shown in the following table.

You need to select a network prefix for each office to ensure that there are enough IPv4 addresses for each
client computer.
The solution must minimize the number of unused IP addresses. Which network prefixes should you select?
To answer, drag the appropriate network prefix to the correct branch office in the answer area.
Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 5
You plan to deploy a DHCP server that will support four subnets. The subnets will be configured as shown in
the following table.

You need to identify which network ID you should use for each subnet. What should you identify? To answer,
drag the appropriate network ID to the each subnet in the answer area.
Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 6
You have a server named Server1. Server1 runs Windows Server 2012 R2. Server1 has two network
adapters. Each network adapter must be configured as shown in the following table.

You need to configure the correct IPv6 address prefix for each network adapter. Which prefix should you select
for each network adapter? (To answer, drag the appropriate IPv6 prefix to the correct network adapter in the
answer area. Each prefix may be used once, more than once, or not at all. You may need to drag the split bar
between panes or scroll to view content.)
Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 7
Drag and Drop Question
Your network contains three servers. The servers are configured as shown in the following table.

Your company plans to standardize all of the servers on Windows Server 2012 R2.
You need to recommend an upgrade path for each server.
The solution must meet the following requirements:
- Upgrade the existing operating system whenever possible.
- Minimize hardware purchases.
Which upgrade path should you recommend for each server? To answer, drag the appropriate upgrade path to
each server in the answer area. Each upgrade path may be used once, more than once, or not at all.
Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 8
Your network contains an Active Directory domain named contoso.com. The domain contains a
server named Server!. Server1 runs a Server Core installation of Windows Server 2012 R2.
You install the DNS Server server role on Server1.
You need to perform the following configurations on Server1:
- Create an Active Directory-integrated zone named adatum.com.
- Send unresolved DNS client queries for other domain suffixes to the DNS server of your company's Internet
Service Provider (ISP).
Which Windows PowerShell cmdlets should you use? To answer, drag the appropriate cmdlet to the correct
configuration in the answer area. Each cmdlet may be used once, more than once, or not at all. You may need
to drag the split bar between panes or scroll to view content.
Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 9
Drag and Drop Question
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012
R2. All client computers run Windows 8.
The domain contains a security group named Group1.
You have a Group Policy object (GPO) named GP01. GPO1 is linked to the domain. You need to ensure that
only the members of Group1 can run the applications shown in the following table.

Which type of application control policy should you implement for each application? To answer, drag the

appropriate rule types to the correct applications. Each rule type may be used once, more than once, or not at
all. You may need to drag the split bar between panes or scroll to view content.

Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 10
Drag and Drop Question
You have a Hyper-V host named Host1. Host1 contains two virtual machines named VM1 and VM2. VM1 is
configured as a print server. VM1 runs Windows Server 2008 R2. VM2 is configured as a file server. VM2 runs
Windows Server 2012 R2.
You need to migrate all of the printers on VM1 to VM2.
Which actions should you perform on the virtual machines? To answer, drag the appropriate action to the

correct servers in the answer area. Each action may be used once, more than once, or not at all. You may
need to drag the split bar between panes or scroll to view content.
Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 11
Drag and Drop Question
You have a server named Server1 that runs Windows Server 2012 R2.
You add a new internal SAS disk to Server1.
You need to ensure that the new disk is available to store files.
Which three cmdlets should you run in sequence?
To answer, move the appropriate three cmdlets from the list of cmdlets to the answer area and arrange them in
the correct order.

Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 12
Drag and Drop Question
You have a server named Server1 that runs Windows Server 2012 R2. You need to perform the following
storage configuration tasks on Server1:
- Bring a disk named Diskl online.
- Defragment a volume named Volumel.
- Remove a disk named Disk2 from a storage pool named Pooll.
Which cmdlet should you use to perform each task? To answer, drag the appropriate cmdlets to the correct
tasks. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar
between panes or scroll to view content.
Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 13
Drag and Drop Question
You are configuring a multi-subnet IPv6 network for a regional office. The corporate network administrator
allocates the 2001:0db8:1234:0800: :/54 address space for your use.
You need to identify network IDs of the first and last subnets that you will be able to create at the office.
Which network IDs should you identify? To answer, drag the appropriate network IDs to the correct subnets.
Each network ID may be used once, more than once, or not at all. You may need to drag the split bar between
panes or scroll to view content.

Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 14
Drag and Drop Question
You have a Hyper-V host named Server1. Server1 hosts a virtual machine named VM1. You view the
properties of VM1 as shown in the following exhibit. (Click the Exhibit button.)

You need to configure bandwidth management for VM1.


Which three actions should you perform in sequence? (To answer, move the appropriate three actions from
the list of actions to the answer area and arrange them in the correct order.)

Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 15
Drag and Drop Question

You have a Hyper-V host named Server1. A technician creates a virtual machine named VM1 on Server1 by
using the New Virtual Machine Wizard.
You start VM1 and you discover that there is no option to start by using PXE.
You need to ensure that you can start VM1 by using PXE.
Which three actions should you perform in sequence? (To answer, move the appropriate three actions from
the list of actions to the answer area and arrange them in the correct order.)
Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 16
Drag and Drop Question
You have a server that runs Windows Server 2012 R2.
You need to create a volume that will remain online if two disks in the volume fail. The solution must minimize
the number of disks used to create the volume. Which three actions should you perform in sequence? (To
answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the
correct order.)
Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 17
Drag and Drop Question
Your network contains an Active Directory domain named contoso.com. The domain contains two servers
named Server1 and Server2. Server1 and Server2 run a Server with a GUI installation of Windows Server
2012 R2.
You remove the Graphical Management Tools and Infrastructure feature on Server2.
You need to restart Server2.
What should you do? (To answer, drag the appropriate tools to the correct statements. Each tool may be used
once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view
content.)
Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 18
Drag and Drop Question
Your network contains an Active Directory domain named contoso.com. The domain contains a domain
controller named DC1 that has the DNS Server server role installed. DC1 hosts an Active Directory-integrated
zone for the domain. The domain contains a member server named Server1.
You install the DNS Server server role on Server1.
You need to ensure that Server1 can respond authoritatively to queries for the existing contoso.com
namespace.
Which cmdlets should you run on each server? (To answer, drag the appropriate cmdlets to the correct
servers. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar
between panes or scroll to view content.)
Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 19
Drag and Drop Question
You have two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 has the HyperV server role installed. Server1 hosts a virtual machine named VM1. VM1 is currently running. VM1 has a
snapshot that was created two weeks ago. You plan to use Server2 to perform a forensic analysis of the
contents of the disk of VM1 from two weeks ago.
You need to ensure that you can view the contents of the disk of VM1 from two weeks ago from Server2.
Which three actions should you perform in sequence? (To answer, move the appropriate three actions from
the list of actions to the answer area and arrange them in the correct order.)
Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 20
Drag and Drop Question
You have a server named Server1 that runs Windows Server 2012 R2.
You need to create a new volume on Server1.
The new volume must have the following configurations:
- Be stored on a new virtual hard disk
- Be assigned the drive letter G
- Have the NTFS file system
In which order should you run the Diskpart commands? To answer, move all the Diskpart commands from the
list of commands to the answer area and arrange them in the correct order.

Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

Explanation:

QUESTION 21
Drag and Drop Question
Your network contains an Active Directory domain named contoso.com. The domain contains a member
server named Server1. Server1 runs Windows Server 2012 and has the File Server server role installed. On
Server1, you create a share named Documents. The Share permission for the
Documents share is configured as shown in the following table.

The NTFS permission for the Documents share is configured as shown in the following table.

You need to configure the Share and NTFS permissions for the Documents share.
The permissions must meet the following requirements:
- Ensure that the members of a group named Group1 can read files and run programs in - Documents. Ensure
that the members of Group1 can modify the permissions on their own files in Documents.
- Ensure that the members of Group1 can create folders and files in Documents.
- Minimize the number of permissions assigned to users and groups.
How should you configure the permissions? To answer, drag the appropriate permission to the correct
location. Each permission may be used once, more than once, or not at all. You may need to drag the split bar
between panes or scroll to view content.
Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 22
Drag and Drop Question
You are configuring a test network. The test network contains a subnet named LAN1.
LAN1 uses the network ID of 10.10.1.0/27.
You plan to add a new subnet named LAN2 to the test network.
LAN1 and LAN2 will be connected by a router.
You need to identify a valid network ID for LAN2 that meets the following requirements:
- Ensures that hosts on LAN2 can communicate with hosts on LAN1.
- Supports at least 100 IPv4 hosts.
- Uses only private IP addresses.
Which network ID should you use? To answer, drag the appropriate network ID and subnet mask to the correct
location in the answer area.
Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 23
Drag and Drop Question
You plan to deploy a DHCP server that will support four subnets. The subnets will be configured as shown in
the following table.

You need to identify which network ID you should use for each subnet. What should you identify? To answer,
drag the appropriate network ID to the each subnet in the answer area.

Select and Place:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

Explanation:

HotSpot
QUESTION 1
Which one is your first step in a newly installed Windows Server 2012 R2 core to be Managed from a another
Windows Server 2012 R2 with computer manager?

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 2
You have a server named Server1. Server1 runs Windows Server 2012 R2. Server1 has two network adapters
and is located in a perimeter network.
You need to install a DHCP Relay Agent on Server1.
Which node should you use to add the DHCP Relay Agent? To answer, select the appropriate node in the
answer area.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 3
Hotspot Question
Your network contains an Active Directory domain named contoso.com. The domain contains servers named
Server1 and Server2 that run Windows Server 2012 R2. You create a windows PowerShell script named
Scriptl.psl that contains the following configuration:

You need to apply the configuration to Server1. The solution must ensure that the configuration on Server1
can be updated by modifying a MOF file on Server2.
Which actions should you perform on each server?
To answer, select the appropriate server on which to perform each action in the answer area.

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 4
Hotspot Question
You have a Hyper-V host named Hyperv1 that runs Windows Server 2012 R2. Hyperv1 hosts a virtual
machine named Server1. Server1 uses a disk named Server1.vhdx that is stored locally on Hyperv1.
You stop Server1, and then you move Server1.vhdx to an iSCSI target that is located on another server.
You need to configure Server1 to meet the following requirements:
- Ensure that Server1 can start by using Server1.vhdx.
- Prevent Server1.vhdx from consuming more than 500 IOPS on the iSCSI target.
Which two objects should you configure?
To answer, select the appropriate two objects in the answer area.

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 5
Hotspot Question
Your network contains an Active Directory domain named contoso.com. The network contains a DHCP server
named DHCP1.
You add a new network segment to the network. On the new network segment, you deploy a new server
named Server1 that runs Windows Server 2012 R2.
You need to configure Server1 as a DHCP Relay Agent.

Which server role should you install on Server1? To answer, select the appropriate role in the answer area.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

Explanation:
If you opt to create a centralized or hybrid DHCP infrastructure, you will need a DHCP relay agent on every
subnet that does not have a DHCP server on it. Many routers are capable of functioning as DHCP relay
agents, but in situations where they are not, you can configure a Windows Server 2012 computer to function
as a relay agent.
http://my.safaribooksonline.com/book/certification/9780735673151/4dot-deploying-and- configuring-corenetwork-services/objective_42_configure_servers_html
QUESTION 6
Hotspot Question
Your network contains an Active Directory domain named fabrikam.com.
You implement DirectAccess and an IKEv2 VPN.
You need to view the properties of the VPN connection.
Which connection properties should you view? To answer, select the appropriate connection properties in the
answer area.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 7
Hotspot Question
Your network contains an Active Directory forest. The forest contains two domains named Domain1 and
Domain2. Domain1 contains a file server named Server1. Server1 has a shared folder named Share1.
Domain2 contains 50 users who require access to Share1. You need to create groups in each domain to meet
the following requirements:
- In Domain1, create a group named Group1. Group1 must be granted access to Share1.
- In Domain2, create a group named Group2. Group2 must contain the user accounts of the 50 users.
- Permission to Share1 must only be assigned directly to Group1.
Which type of groups should you create and which group nesting strategy should you use? To answer, select
the appropriate configuration in the answer area.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 8
Hotspot Question
You have a server named Server1 that runs Windows Server 2012 R2.
Server1 does not have Internet connectivity.
All roles are removed completely from Server1.
You mount a Windows Server 2012 R2 installation image to the C:\Source folder. You need to install the DNS
Server server role on Server1. Which folder should you use as the source? To answer, select the appropriate
folder in the answer area.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 9
Hotspot Question
You have a server named Server1 that runs Windows Server 2012 R2. Several users are members of the local
Administrators group.
You need to ensure that all local administrators receive User Account Control (UAC) prompts when they run a
Microsoft Management Console (MMC).
Which setting should you modify from the Local Security Policy? To answer, select the appropriate settings in
the answer area
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 10
Hotspot Question
Your network contains an Active Directory domain named contoso.com. The domain contains two servers
named Server1 and Server2 that run Windows Server 2012 R2. From Server2, you attempt to connect to
Server1 by using Computer Management and you receive the following error message:
"Computer\ \Server1 cannot be found. The network path was not found."
From Server1, you successfully connect to Server2 by using Server Manager. You need to ensure that you
can manage Server1 remotely from Server2 by using Computer Management.
What should you configure? To answer, select the appropriate option in the answer area.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 11
Hotspot Question
Your network contains an Active Directory domain named contoso.com. The domain contains 25 servers. All
servers run Windows Server 2012 R2. You need to create a Windows Firewall rule to prevent administrators
from using Internet Explorer to access the Internet while they are logged on interactively to the servers. The
solution must not prevent administrators from accessing websites on the internal network. How should you
configure the rule? To answer, select the appropriate options in the answer area.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 12
Hotspot Question
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts 50 virtual
machines.
You need to create a script to list all of the virtual machines that have checkpoints and support Secure Boot.
What should you do? To answer, select the appropriate options in the answer area.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 13
Hotspot Question
Your network contains an Active Directory domain named contoso.com.
All domain controllers run Windows Server 2012 R2.
All server are configured to enforce AppLocker policies.
You install a server named Server1.
On Server1, you install an application named appl.exe in a folder located on C:\App1.
You have two domain groups named Group1 and Group2.
A user named User1 is a member of Group1 and Group2.
You create a Group Policy object (GPO) named GPO1.
You link GPO1 to contoso.com.
You create the executable rules as shown in the exhibit by using the Create Executable Rules wizard. (Click
the Exhibit button.)

To answer, complete each statement according to the information presented in the exhibit.
Each correct selection is worth one point.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 14
Hotspot Question
You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts 40 virtual
machines that run Windows Server 2008 R2. The virtual machines connect to a private virtual switch. You
have a file that you want to copy to all of the virtual machines. You need to identify to which servers you can
copy files by using the Copy-VmFile cmdlet. What command should you run? To answer, select the
appropriate options in the answer area.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 15
Hotspot Question
Your network contains an Active Directory forest.
The forest contains a single domain named contoso.com.
AppLocker policies are enforced on all member servers.
You view the AppLocker policy applied to the member servers as shown in the exhibit.
(Click the Exhibit button.)

To answer, complete each statement according to the information presented in the exhibit.
Each correct selection is worth one point.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

Explanation:
Windows Mail is not present on windows servers, so "No one can run Windows Mail on the servers."
At the exam Windows Mail was changed with Wordpad. So "Everyone can run Wordpad on the servers".
QUESTION 16
Hotspot Question
You have a DHCP server named Server1 that runs Windows Server 2012 R2. On Server1, you run the
commands as shown in the exhibit. (Click the Exhibit button.)

To answer, complete each statement according to the information presented in the exhibit.
Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 17
Hotspot Question
A printer named Printer1 is configured as shown in the exhibit. (Click the Exhibit button.)

To answer, complete each statement according to the information presented in the exhibit.
Each correct selection is worth one point.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 18
Hotspot Question
You have a print server named Server1 that runs Windows Server 2012 R2. On Server1, you create and share
a printer named Printer1. The Advanced settings of Printer1 are shown in the Advanced exhibit. (Click the
Exhibit button.)

The Security settings of Printer1 are shown in the Security exhibit. (Click the Exhibit button.)

The Members settings of a group named Group1 are shown in the Group1 exhibit. (Click the Exhibit button.)

Select Yes if the statement can be shown to be true based on the available information; otherwise select No.
Each correct selection is worth one point.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 19
Hotspot Question
You have a server named Server1 that runs Windows Server 2012 R2. You need to switch Server1 to a Server
Core installation of Windows Server 2012 R2.
What command should you run?
To answer, select the appropriate options in the answer area.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 20
Hotspot Question
Your network contains an Active Directory domain. The domain contains a server named Server28. The
computer account of Server 28 is located in an organizational unit (OU) named OU1. A Group Policy object
(GPO) named Application Restriction Policy is linked to OU1. The settings of the GPO are configured as
shown in the GPO Settings exhibit. (Click the Exhibit button.)

The Services console on Server28 is shown in the Services exhibit. (Click the Exhibit button.)

Select Yes if the statement can be shown to be true based on the available information; otherwise select No.
Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 21
Hotspot Question
Your network contains an Active Directory domain named corp.contoso.com. The domain contains a domain
controller named DC1. When you run ping dcl.corp.contoso.com, you receive the result as shown in the
exhibit. (Click the Exhibit button.)

You need to ensure that DC1 can respond to the Ping command. Which rule should you modify? To answer,
select the appropriate rule in the answer area.

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 22
Hotspot Question
Your network contains an Active Directory domain named adatum.com. You create an account for a temporary
employee named User1. You need to ensure that User1 can log on to the domain only between 08:00 and
18:00 from a client computer named Computer1.
From which tab should you perform the configuration? To answer, select the appropriate tab in the answer
area.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

Explanation:
To set logon hours
1. Open Active Directory Users and Computers.
2. In the console tree, click Users.
Where?
Active Directory Users and Computers/domain
node/Users Or, click the folder that contains the user account.
3. Right-click the user account, and then click Properties.
4. On the Account tab, click Logon Hours, and then set the permitted or denied logon hours for the user.

http://technet.microsoft.com/en-us/library/cc740199(v=ws.10).aspx
QUESTION 23
Hotspot Question
Your network contains an Active Directory domain named contoso.com. All client computers run Windows 8.
An administrator creates an application control policy and links the policy to an organizational unit (OU) named
OU1. The application control policy contains several deny rules.
The deny rules apply to the Everyone group.
You need to prevent users from running the denied application. What should you configure? To answer, select
the appropriate object in the answer area.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

Explanation:
To enable the Enforce rules enforcement setting by using the Local Security Policy snap-in
1. Click Start, type secpol.msc in the Search programs and files box, and then press ENTER.
2. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then
click Yes.
3. In the console tree, double-click Application Control Policies, right-click AppLocker, and then click
Properties.
4. On the Enforcement tab, select the Configured check box for the rule collection that you want to enforce,
and then verify that Enforce rules is selected in the list for that rule collection.
5. Repeat step 4 to configure the enforcement setting to Enforce rules for additional rule collections.
6. Click OK.
http://technet.microsoft.com/en-us/library/ee791885(v=ws.10).aspx

QUESTION 24

Hotspot Question
Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1
has the Hyper-V server role installed. Server2 has the Windows Deployment Services server role installed. On
Server1, you have a virtual machine named VM1. You plan to deploy an image to VM1 by using Windows
Deployment Services (WDS). You need to ensure that VM1 can connect to Server1 by using PXE. Which
settings should you configure on VM1? To answer, select the appropriate settings in the answer area.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

Explanation:
Virtual machines can be deployed to Hyper-V using Windows Deployment Services (WDS). To accomplish this
requires the proper WDS infrastructure be in place and that the VM PXE boot using a Legacy Network
Adapter. By default, there is only a "Standard Network Adapter" installed on the Virtual Machine, but for PXE
functionality you will need to add a "Legacy Network Adapter". Go to the "Legacy Network Adapter" that you
just added and specify that it should use the Virtual Switch that you just created.
Last but not least, you should change the BIOS boot priority to make sure that the Virtual Machine always tries
to boot first using the "Legacy Network Adapter". Just select the "Legacy Network Adapter" and move it to the
top using the buttons.

Start your Virtual Machine and now PXE boot should work
http://www.danielclasson.com/guide-how-to-get-pxe-boot-to-work-in-hyper-v/ http://blogs.technet.com/b/
askcore/archive/2008/11/25/installing-a-vm-operating-system-using-a- legacy- network-adapter-and-pxeboot.aspx
QUESTION 25
Hotspot Question
You have a Hyper-V host named HYPERV1. HYPERV1 hosts a virtual machine named DC1. You need to
prevent the clock on DC1 from synchronizing from the clock on HYPERV1. What should you configure? To
answer, select the appropriate object in the answer area.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

Explanation:
Virtual machines can be deployed to Hyper-V using Windows Deployment Services (WDS). To accomplish this
requires the proper WDS infrastructure be in place and that the VM PXE boot using a Legacy Network
Adapter. By default, there is only a "Standard Network Adapter" installed on the Virtual Machine, but for PXE
functionality you will need to add a "Legacy Network Adapter". Go to the "Legacy Network Adapter" that you
just added and specify that it should use the Virtual Switch that you just created.
Last but not least, you should change the BIOS boot priority to make sure that the Virtual Machine always tries
to boot first using the "Legacy Network Adapter". Just select the "Legacy Network Adapter" and move it to the
top using the buttons.

Start your Virtual Machine and now PXE boot should work
http://www.danielclasson.com/guide-how-to-get-pxe-boot-to-work-in-hyper-v/ http://blogs.technet.com/b/
askcore/archive/2008/11/25/installing-a-vm-operating-system-using-a- legacy- network-adapter-and-pxeboot.aspx
QUESTION 26
Hotspot Question
You deploy a Server with a GUI installation of Windows Server 2012 R2 Datacenter. From Windows
PowerShell, you run the following command: Remove-WindowsFeature ServerGui-Shell. In the table below,
identify which tools are available on Server1 and which tools are unavailable on Server1. Make only one
selection in each row. Each correct selection is worth one point
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 27
Hotspot Question
Your network contains an Active Directory domain named contoso.com. You need to identify whether the
Company attribute replicates to the global catalog. Which part of the Active Directory partition should you
view? To answer, select the appropriate Active Directory object in the answer area.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

Explanation:
Schema -Contains the Schema container, which stores class and attribute definitions for all existing and
possible Active Directory objects in cn=schema,cn=configuration,dc= forestRootDomain . Updates to this
container are replicated to all domain controllers in the forest. You can view the contents of the Schema
container in the Active Directory Schema console. http://technet.microsoft.com/en-us/library/cc961591.aspx
QUESTION 28
Hotspot Question
You have a DNS server named Server1. Server1 runs Windows Server 2012 R2. The network ID is
10.1.1.0/24. An administrator creates several reverse lookup zones. You need to identify which reverse lookup
zone is configured correctly. Which zone should you identify? To answer, select the appropriate zone in the
answer area.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 29
Hotspot Question
Your network contains an Active Directory domain named contoso.com. The domain contains a print server
named Server1 that runs Windows Server 2012 R2.
You share several printers on Server1.
You need to ensure that you can view the printer objects associated to Server1 in Active Directory Users and
Computers.
Which option should you select? To answer, select the appropriate option in the answer area.
Hot Area:

Correct Answer:

Section: (none)
Explanation

Explanation/Reference:

Explanation:
You can view printer objects in Active Directory by clicking Users, Groups, and Computers as containers from
the View menu in the Active Directory Users and Computers snap-in. By default, printer objects are created
under the machine object in which they are shared. After you turn on the Users, Groups, and Computers as
containers option, you can see printers by expanding the printer's host computer.
http://support.microsoft.com/kb/235925
QUESTION 30
Hotspot Question
You have a server named Server1. Server1 runs Windows Server 2012 R2 and has the Windows Deployment
Services (WDS) server role installed.
You install the DHCP Server server role on Server1.
You need to ensure that Server1 can respond to DHCP clients and WDS clients. What should you configure
for the DHCP service and the WDS service? To answer, configure the appropriate options in the answer area.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 31
Hotspot Question
You have a server named Server1. Server1 runs Windows Server 2012 R2. A user named Admin1 is a
member of the local Administrators group.
You need to ensure that Admin1 receives a User Account Control (UAC) prompt when attempting to open
Windows PowerShell as an administrator.
Which setting should you modify from the Local Group Policy Editor? To answer, select the appropriate setting
in the answer area.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 32
Hotspot Question
Your network contains an Active Directory domain named adatum.com. All domain controllers run Windows
Server 2012 R2. All client computers run Windows 7. The computer accounts for all of the client computers are
located in an organizational unit (OU) named OU1. An administrator links a Group Policy object (GPO) to OU1.
The GPO contains several application control policies. You discover that the application control policies are not
enforced on the client computers. You need to modify the GPO to ensure that the application control policies
are enforced on the client computers.
What should you configure in the GPO? To answer, select the appropriate service in the answer area.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

Explanation:
Does AppLocker use any services for its rule enforcement? Yes, AppLocker uses the Application Identity
service (AppIDSvc) for rule enforcement. For AppLocker rules to be enforced, this service must be set to start
automatically in the GPO. http://technet.microsoft.com/en-us/library/ee619725%28v=ws.10%29.aspx
QUESTION 33
Hotspot Question
Your network contains an Active Directory domain named contoso.com. Domain controllers run either
Windows Server 2008 R2 or Windows Server 2012 R2. All client computers run Windows 8. All computer
accounts are located in an organizational unit (OU) named OU1.
You create a Group Policy object (GPO) that contains several AppLocker rules.
You link the GPO to OU1.
You need to ensure that the AppLocker rules apply to all of the client computers. What should you configure in
the GPO? To answer, select the appropriate service in the answer area.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

Explanation:
Does AppLocker use any services for its rule enforcement? Yes, AppLocker uses the Application Identity
service (AppIDSvc) for rule enforcement. For AppLocker rules to be enforced, this service must be set to start
automatically in the GPO. http://technet.microsoft.com/en-us/library/ee619725%28v=ws.10%29.aspx
QUESTION 34
Hotspot Question
Your network contains an Active Directory domain named contoso.com. Technicians use Windows
Deployment Services (WDS) to deploy Windows Server 2012 R2. The network contains a server named
Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. You need to
ensure that you can use WDS to deploy Windows Server 2012 R2 to a virtual machine named VM1.
Which settings should you configure?
To answer, select the appropriate settings in the answer area.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 35
Hotspot Question
Your network contains an Active Directory forest. The forest contains two domains named Domain1
and Domain2. Domain1 contains a file server named Server1. Server1 has a shared folder named
Share1. Domain2 contains 50 users who require access to Share1.
You need to create groups in each domain to meet the following requirements:
- In Domain1, create a group named Group1. Group1 must be granted access
to Share1.
- In Domain2, create a group named Group2. Group2 must contain the user
accounts of the 50 users.
- Permission to Share1 must only be assigned directly to Group1.
Which type of groups should you create and which group nesting strategy should you use? To
answer, select the appropriate configuration in the answer area.
Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

Explanation:
Any group, whether it is a security group or a distribution group, is characterized by a scope that identifies the
extent to which the group is applied in the domain tree or forest. The boundary, or reach, of a group scope is
also determined by the domain functional level setting of the domain in which it resides. There are three group
scopes:
universal, global, and domain local.

http://support.microsoft.com/default.aspx?scid=kb;EN-US;231273 http://technet.microsoft.com/en-us/library/
cc772723%28WS.10%29.aspx http://technet.microsoft.com/pt-br/library/cc728188%28WS.10%29.aspx http://
technet.microsoft.com/en-us/library/cc755692%28WS.10%29.aspx

QUESTION 36
Hotspot Question

Your network contains an Active Directory domain named contoso.com. Computer accounts for the marketing
department are in an organizational unit (OU) namedDepartments\Marketing\Computers.
User accounts for the marketing department are in an OU named Departments\Marketing\Users. Marketing
users can only log on to the client computers in the Departments\Marketing\Computers OU.
You need to apply an application control policy to all of the marketing users. Which Group Policy Object (GPO)
should you configure? To answer, select the appropriate GPO in the answer area.

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 37
Hotspot Question
You run a Windows Server 2012 R2and implementing 3 new printers in a warehouse. You need to makean
exclusion forthese IP addresses within DHCP server. Select the location where would configure at the DHCP
console?

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

Explanation:
http://technet.microsoft.com/en-us/library/cc737978%28v=ws.10%29.aspx
QUESTION 38
Hotspot Question
Your network contains a domain controller named dc5.adatum.com that runs Windows Server 2012 R2.
You discover that you can connect successfully to DC5 over the network, but you receive a request timed out
message when you attempt to ping DC5.
You need to configure DC5 to respond to ping request.
Which firewall rule should you modify on DC5? To answer, select the appropriate rule in the answer area.

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 39
Hotspot Question
You have a shared folder named Share1. The folder permissions of Share1 are configured as shown in the
Folder Permissions exhibit. (Click the Exhibit button.)

The Share permissions of Share1 are configured as shown in the Share Permissions exhibit. (Click the Exhibit
button.)

You have a group named Group1. The members of Group1 are shown in the Group1 exhibit. (Click the Exhibit
button.)

Select Yes if the statement can be shown to be true based on the available information; otherwise select No.
Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 40
Hotspot Question
Your network contains two Active Directory forests named contoso.com and adatum.com.
A two-way forest trust exists between the forests.
You have custom starter Group Policy objects (GPOs) defined in contoso.com. You need to ensure that the
same set of custom starter GPOs are available in adatum.com. In the table below, identify which action must
be performed for the starter GPOs container in each forest. Make only one selection in two of the rows. Each
correct selection is worth one point.

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 41
Hotspot Question
You have a server named Server1 that runs Windows Server 2012 R2. Server1 is a member of a workgroup.
You need to ensure that only members of the Administrators group and members of a group named Group1
can log on locally to Server1.
Which settings should you modify from the Local Security Policy? To answer, select the appropriate settings in
the answer area.

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

Explanation:
UAC Is controlled by local security policy.
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Option You can use the
Local Security Policy console to modify the behavior of UAC. Start Local Security Policy (Secpol.msc) and
open Security Settings\Local Policies\Security Options.

User Account Control (UAC) helps prevent malicious programs (also called malware) from
damaging a computer and helps organizations deploy a better-managed desktop. With UAC, applications and
tasks always run in the security context of a non-administrator account, unless an administrator specifically
authorizes administrator-level access to the system. UAC can block the automatic installation of unauthorized
applications and prevent inadvertent changes to system settings.
http://technet.microsoft.com/en-us/library/jj574202.aspx
QUESTION 42
Hotspot Question
Your network contains an Active Directory domain named contoso.com. The network contains two subnets.
The subnets are configured as shown in the following table.

The network contains a member server named Server1 that runs Windows Server 2012 R2.
Server1 has the DHCP Server server role installed. Server1 is configured to lease IP addresses to the two
subnets.
You add three new printers to the Warehouse subnet. The printers have static IP addresses.
The IP addresses are consecutive.
You need to create an exclusion range that contains the IP addresses of the printers. From which node should
you configure the exclusion range? To answer, select the appropriate node in the answer area.

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 43
Hotspot Question
Your network contains an Active Directory domain named contoso.com. The domain contains a single location
named Site1. The domain contains a server named Server1 that has the DHCP Server server role installed. All
client computers receive their IPv4 configurations dynamically. The domain will expand to include a second
location named Site2. A server named Server2 will be deployed to Site2. Site1 and Site2 will connect to each
other by using a WAN link. You need to ensure that the clients in both sites receive their IPv4 configurations
from Server1. In the table below, identify which actions must be performed on each server. Make only one
selection in each row. Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 44
Hotspot Question
You have a Hyper-V host named Server1 that runs Windows Server 2008 R2. All of the virtual machines on
Server1 use VHDs.
You install the Hyper-V server role on a server named Server2 that runs Windows Server 2012 R2. Server2
has the same hardware configurations as Server1. You plan to migrate the Hyper-V host from Server1 to
Server2 by using the Windows Server Migration Tools.
In the table below, identify what can be migrated by using the Windows Server Migration Tools. Make only one
selection in each row. Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 45
Hotspot Question
You have three servers named Server1, Server2, and DO that run Windows Server 2012 R2. IPv6 addresses
and configurations are assigned to all of the servers by using DHCPv6. The IPv6 routing on Server1 is shown
in the following table.

You verify that Server2 can ping the IPv6 address of DC1. You need to ensure that Server1 can ping the IPv6
address of DC1. What command should you run on Server1? (To answer, select the appropriate options in the
answer area.)

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 46
Hotspot Question
You have two servers that run Windows Server 2012 R2.
The servers are configured as shown in the following table.

You need to ensure that Server2 can be managed by using Server Manager from Server1. In the table below,
identify which actions must be performed on Server1 and Server2. Make only one selection in each row. Each
correct selection is worth one point.

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 47
Hotspot Question
Your network contains an Active Directory domain named contoso.com. The domain contains a server named
Server that runs Windows Server 2012 R2. You perform a Server Core Installation of Windows Server 2012
R2 on a new server. You need to ensure that you can add the new server to Server Manager on Server1.
What should you configure on the new server?To answer, select the appropriate setting in the answer area.

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 48
Hotspot Question
The settings for a virtual machine named VM2 are configured as shown in the VM2 exhibit. (Click the Exhibit
button.)

The settings for Diskl.vhdx are configured as shown in the Diskl.vhdx exhibit. (Click the Exhibit button.)

The settings for Disk2.vhdx are configured as shown in the Disk2.vhdx exhibit. (Click the Exhibit button.)

Select Yes if the statement can be shown to be true based on the available information; otherwise select No.
Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 49
Hotspot Question
Your network contains an Active Directory domain named contoso.com. The domain contains a print server
named Print1 that runs Windows Server 2012 R2. Print1 has 50 shared printers. Each
printer is listed in Active Directory. From Active Directory Users and Computers, you browse to Print1 and you
discover that the 50 printers are not visible. You need to ensure that you can view the printer objects in Active
Directory Users and Computers. Which option should you select? To answer, select the appropriate option in
the answer area.

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 50
Hotspot Question
You have a file server named Server1 that runs Windows Server 2012 R2.
Server1 contains a folder named Folder1.

A user named User1 is a member of Group1 and Group2.


A user named User2 is a member of Group2 and Group3.
You need to identify which actions the users can perform when they access the files in Share1. What should
you identify? To answer, select the appropriate actions for each user in the answer area.

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

Explanation:
In the real exam, it be changed:
User1 is the member of Group2 and Group3, and User2 is a member of Group1 and Group2
QUESTION 51
Hotspot Question
Your network contains an Active Directory domain named contoso.com. The domain contains an
organizational unit (OU) named OU1 as shown in the OU1 exhibit. (Click the Exhibit button.)

The membership of Group1 is shown in the Group1 exhibit. (Click the Exhibit button.)

You configure GPO1 to prohibit access to Control Panel. GPO1 is linked to OU1 as shown in the GPO1
exhibit. (Click the Exhibit button.)

Select Yes if the statement can be shown to be true based on the available information; otherwise select No.
Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 52
Hotspot Question
You have a Group Policy object (GPO) named Server Audit Policy. The settings of the GPO are shown in the
Settings exhibit. (Click the Exhibit button.)

The scope of the GPO is shown in the Scope exhibit. (Click the Exhibit button.)

The domain contains a group named Group1. The membership of Group1 is shown in the Group1 exhibit.
(Click the Exhibit button.)

Select Yes if the statement can be shown to be true based on the available information; otherwise select No.
Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 53
Hotspot Question
Your company has a main office and a sales office. The main office has 2,000 users. The sales office has 20

users. All client computers in the sales office run Windows 8. The sales office contains a print server named
App1 that runs Windows Server 2012 R2. App1 has a shared printer named Printer1. Printer1 connects to a
network-attached print device. You plan to connect all of the users in the sales office to Printer1 on App1. You
need to ensure that if App1 fails, the users can continue to print to Printer1. What should you configure on
App1? To answer, select the appropriate option in the answer area.

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

QUESTION 54
Hotspot Question
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the HyperV server role
installed.
You need to implement NIC teaming on Server1.
Which two network connections should you include on the NIC team? (To answer, select the two appropriate
network connections in the answer area.)

Hot Area:

Correct Answer:

Section: (none)
Explanation
Explanation/Reference:

Vous aimerez peut-être aussi